Description

Book Synopsis

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.



Table of Contents

Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.

Cryptographic and Information Security Approaches

Product form

£126.00

Includes FREE delivery

RRP £140.00 – you save £14.00 (10%)

Order before 4pm tomorrow for delivery by Thu 1 Jan 2026.

A Hardback by S. Ramakrishnan

15 in stock


    View other formats and editions of Cryptographic and Information Security Approaches by S. Ramakrishnan

    Publisher: Taylor & Francis Ltd
    Publication Date: 1/22/2023 12:11:00 AM
    ISBN13: 9781032598024, 978-1032598024
    ISBN10: 1032598026

    Description

    Book Synopsis

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.



    Table of Contents

    Part 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account