Cryptographic and information security. Approaches for images and videos

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Ramakrishnan S. (ed.)
Publisher: CRC Press
Year: 2019

Language: English
Pages: 961
City: Boca Raton, FL
Tags: Computer security.;Multimedia communications -- Security measures.;Data encryption (Computer science);Data protection.;COMPUTERS / Security / General.

Content: Introduction to Information Security Systems Primitives - Majid Khan and Syeda Iram Batool NaqviCryptographic Image Scrambling Techniques - Bhaskar MondalChaos Based Image Cryptography - Charles Z. Liu, Linda Y. Dong, and Raymond P. ShawFundamental Cryptographic Characteristics of Boolean Functions - A Review -Majid Khan and Syeda Iram Batool NaqviPhase Retrieval in Optical Cryptography - Naveen Kumar Nishchaland Areeba FatimaSecurity and Cryptography in images and video using Elliptic Curve Cryptography(ECC) - Piyush Raghav and Amit DuaSecurity of Scalable Video Coding : Encryption and Authentication - Zhuo Wei, Swee Won Lo, Yongdong Wu, Yanjiang Yang, Zheng Yan and Robert H. DengCompressive Sensing in Color Image Security - Rohit Thanki, Surekha Borra, Komal Borisagar and Nilanjan DeySecure Threshold Attribute-Based Signcryption with Constant Number of Pairings - Sreenivasa Rao and Nishant DoshiMultimedia contents encryption using the chaotic MACM system on a smart-display - Rodrigo Mendez-Ramrez, Adrian Arellano-Delgado, Miguel Murillo-Escobar, and Cesar Cruz-HernandezMedical Image Encryption - V. Padmapriya and R. AmirtharajanWatermarking Techniques for Copyright Protection of Texts in Document Files - Surekha Borra, Rohit Thanki and Nilanjan DeyVLSI Implementation Of Video Watermarking for Secure HEVC Coding Standard -Amit Mahesh JoshiData hiding in compressed images and videos - Liu ShaohuiRobust Image Watermarking Based on Multiple-criteria Decision-Making (MCDM) - Musab Ghadi, Lamri Laouamer, Laurent Nana and Anca PascuThe role of image fusion and watermarking techniques in medical imaging - Ch. Hima BinduWatermarking techniques and its applications in Tele-Health: A Technical Survey - Sriti Thakur, Amit kumar Singh, Satya Prakash Ghrera and Mayank DaveUtilization of Small S-boxes for Information Hiding - Majid Khan and SyedaIram Batool NaqviSecure and robust ECG steganography using Fractional Fourier transform - Gajanan K. Birajdar, Vishwesh A. Vyawahare and Mukesh D. PatilVisual secret sharing scheme for (k,n) threshold based on QR code with multiple decryptions - Song Wan, Yuliang Lu, Xuehu Yan, Yongjie Wang and Chao ChangSteganography based on interpolation and edge detection techniques - Ki-Hyun JungSteganography and Medical Data Security - Rukiye Karakis and Inan GulerDigital Visual Media Forensics - Raahat Devender SinghReview of Image Tampering Detection Techniques - Manu V T and B. M. MehtreBlockchain security for wireless multimedia networks - Ankit Songara , Lokeshchouhan and Pankaj KumarCopy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method - Zahra Hossein-Nejad and Mehdi NasriAnti-Forensics for Image & Video Tampering: A Review - Sitara K and B M MehtreSecuring biometrics using data hiding techniques - Mehul S Raval, Vaibhav B Joshi and Jignesh S BhattSecure Biometric Modalities for Effective Communication - Sandhya TararApplication of Video based Face Recognition for Mobile Security using Machine Learning Techniques - Emir Kremic and Abdulhamit SubasiBiometrics based authentication scheme for Cloud Environment - G. Jaspher Willsie Kathrine