Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Book Series
Mission
Coverage
Dedication
Editorial Advisory Board
Preface
Acknowledgment
Chapter 1: A Review on the Technological and Literary Background of Multimedia Compression
ABSTRACT
INTRODUCTION
METHODOLOGY
RESULTS
TRENDS
CONCLUSION
REFERENCES
Chapter 2: Machine Learning as an Enabler of Continuous and Adaptive Authentication in Multimedia Mobile Devices
ABSTRACT
1. INTRODUCTION
2. LITERATURE REVIEW
3. METHODOLOGY
4. DISCUSSION
5. RESULTS
6. CONCLUSION AND FUTURE WORK
ACKNOWLEDGMENT
REFERENCES
Chapter 3: Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud
ABSTRACT
INTRODUCTION
MULTIMEDIA DATA CONCERNS IN CLOUD
AUTHENTICATION SCHEMES
PROBLEMS WITH AUTHENTICATION SCHEMES
ANONYMOUS AUTHENTICATION
IMPLICIT PASSWORD AUTHENTICATION SYSTEM (IPAS)
SUMMARY
CONCLUSION
REFERENCES
Chapter 4: Robust Multimedia Watermarking
ABSTRACT
INTRODUCTION
REVIEW OF MULTIMEDIA WATERMARKING TECHNIQUES
TECHNIQUES FOR ROBUST WATERMARKING
CONCLUSION
REFERENCES
Chapter 5: Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking
ABSTRACT
INTRODUCTION
TYPES OF WATERMARKING ON THE BASIS OF AVAILABLE CONTENT
COVERING OF DIGITAL WATERMARKING
WATERMARK EMBEDDING AND EXTRACTION PROCESS IN SPATIAL DOMAIN
WATERMARK EMBEDDING PROCESS IN FREQUENCY DOMAIN (DWT)
ROBUST AND ATTACK RESISTANT DIGITAL WATERMARKING
DATA FLOW DIAGRAM
RESULTS AND EVALUATION
CONCLUSION
REFERENCES
Chapter 6: Integer Transform-Based Watermarking Scheme for Authentication of Digital Fundus Images in Medical Science
ABSTRACT
INTRODUCTION
FROM CRYPTOGRAPHY TO WATERMARKING
HISTORY OF WATERMARKING
RELEVANCE OF WATERMARKING IN MEDICAL IMAGES
SECURITY FEATURES OF MEDICAL IMAGES
DIGITAL FUNDUS IMAGE
KEY REQUIREMENTS FOR MEDICAL IMAGE AUTHENTICATION SCHEME
PROBLEM STATEMENT AND CHALLENGES
PROPOSED SCHEME: MODIFIED INTEGER TRANSFORM WATERMARKING SCHEME
EXPERIMENTAL RESULTS AND ANALYSIS
OBSERVATIONS
CRITICAL FINDINGS
CONCLUSION AND FUTURE ENHANCEMENT
REFERENCES
Chapter 7: A Distributed M-Tree for Similarity Search in Large Multimedia Database on Spark
ABSTRACT
INTRODUCTION
RELATED WORK
PRELIMINARIES
METHODOLOGY
EXPERIMENTS
CONCLUSION AND FUTURE WORK
ACKNOWLEDGMENT
REFERENCES
Chapter 8: The Fundamentals of Digital Forensics
ABSTRACT
INTRODUCTION
LIFE CYCLES OF DIGITAL FORENSICS
EVALUATION OF DIGITAL FORENSICS TOOLS
COMPARISON OF DIGITAL FORENSICS TOOLS FTK, ENCASE AND HELIX
DIGITAL FORENSICS TOOLS AND TECHNIQUES EXAMINATION
CONCLUSION
REFERENCES
Chapter 9: Comparative Evaluations of Human Behavior Recognition Using Deep Learning
ABSTRACT
INTRODUCTION
RELATED WORK
METHODOLOGY
EXPERIMENTAL RESULTS
CONCLUSION
REFERENCES
Chapter 10: Container Orchestration With Cost-Efficient Autoscaling in Cloud Computing Environments
ABSTRACT
INTRODUCTION
SYSTEM ARCHITECTURE
PERFORMANCE EVALUATION
CONCLUSION AND FUTURE DIRECTIONS
ACKNOWLEDGMENT
REFERENCES
Chapter 11: Gait Recognition Using Deep Learning
ABSTRACT
INTRODUCTION
RELATED WORK
METHODOLOGY
EXPERIMENTAL RESULTS
CONCLUSION
REFERENCES
Chapter 12: USRP-Based Secure Data Transmission
ABSTRACT
INTRODUCTION
RELATED WORKS
PROPOSED METHODOLOGY
RESULTS AND DISCUSSION
PERFORMANCE METRICES
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 13: Continuous User Authentication on Touchscreen Using Behavioral Biometrics Utilizing Machine Learning Approaches
ABSTRACT
INTRODUCTION
BIOMETRICS AUTHENTICATION
CONTINUOUS AUTHENTICATION METHODS AND APPROACHES
CONTINUOUS USER AUTHENTICATION FRAMEWORK BASED ON TOUCHSCREEN ACTIONS
EXPERIMENT DESIGN, RESULTS AND PERFORMANCE EVALUATION
STROKE-LEVEL CLASSIFICATION
PERFORMANCE EVALUATION AND RESULTS DISCUSSION
CONCLUSION AND FUTURE WORK
REFERENCES
ADDITIONAL READING
KEY TERMS AND DEFINITIONS
Chapter 14: Design and Implementation of Visual Blockchain With Merkle Tree
ABSTRACT
INTRODUCTION
RELATED WORK
OUR DESIGN
EXPERIMENTS
RESULTANT ANALYSIS AND DISCUSSIONS
CONCLUSION
REFERENCES
Chapter 15: Multiple Flames Recognition Using Deep Learning
ABSTRACT
INTRODUCTION
RELATED WORK
METHODOLOGY
EXPERIMENTAL RESULTS
CONCLUSION
REFERENCES
Chapter 16: Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods
ABSTRACT
INTRODUCTION
BACKGROUND
PROPOSED APPROACH
EXPERIMENT AND RESULTS
CONCLUSION AND FUTURE WORK
REFERENCES
Chapter 17: The Cost Perspective of Password Security
ABSTRACT
INTRODUCTION
PASSWORDS AND HASH FUNCTIONS
PASSWORDS AND COST
SUMMARY AND CONCLUSION
REFRENCES
ENDNOTE
Compilation of References
About the Contributors
← Prev
Back
Next →
← Prev
Back
Next →