Handbook of research on multimedia cyber security
"This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--
Saved in:
| Other Authors: | Gupta, Brij, d 1982 (Editor), Gupta, Deepak, d 1983 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey PA
Information Science Reference, an imprint of IGI Global
2020
|
| Series: | A volume in the advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Multimedia security watermarking, steganography, and forensics
Published: (2012)
Published: (2012)
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008)
by: Shoniregun, Charles A.
Published: (2008)
Biometrics concepts, methodologies, tools, and applications
Published: (2017)
Published: (2017)
Touchless fingerprint biometrics
by: Labati, Ruggero Donida, et al.
Published: (2016)
by: Labati, Ruggero Donida, et al.
Published: (2016)
Handbook of biometrics
Published: (2008)
Published: (2008)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Watermarked face recognition scheme-enhancing the security while maintaining the effectiveness of biometric authentication systems
by: Mohd Rizal Mohd Isa
Published: (2016)
by: Mohd Rizal Mohd Isa
Published: (2016)
Biometric authentication a machine learning approach
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
Guide to biometrics
by: Bolle, Ruud M., et al.
Published: (2004)
by: Bolle, Ruud M., et al.
Published: (2004)
Biometric image discrimination technologies
by: Zhang, David 1949-, et al.
Published: (2006)
by: Zhang, David 1949-, et al.
Published: (2006)
Multimedia communications directions and innovations
Published: (2001)
Published: (2001)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
Biometrics personal identification in networked society
Published: (1999)
Published: (1999)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Emerging research on networked multimedia communication systems
Published: (2016)
Published: (2016)
Handbook of research on wireless multimedia quality of service and solutions
Published: (2009)
Published: (2009)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Modern theories and practices for cyber ethics and security compliance
Published: (2020)
Published: (2020)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Data science for cyber-security
Published: (2019)
Published: (2019)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Handbook of research on intrusion detection systems
Published: (2020)
Published: (2020)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Similar Items
-
Multimedia security watermarking, steganography, and forensics
Published: (2012) -
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008) -
Biometrics concepts, methodologies, tools, and applications
Published: (2017) -
Touchless fingerprint biometrics
by: Labati, Ruggero Donida, et al.
Published: (2016) -
Handbook of biometrics
Published: (2008)


