LEADER 03277nam 22006134a 450 001 9910451981903321 005 20200520144314.0 010 $a1-281-72168-9 010 $a9786611721688 010 $a0-300-12823-1 024 7 $a10.12987/9780300128239 035 $a(CKB)1000000000471903 035 $a(StDuBDS)BDZ0022171425 035 $a(SSID)ssj0000270780 035 $a(PQKBManifestationID)11211725 035 $a(PQKBTitleCode)TC0000270780 035 $a(PQKBWorkID)10262274 035 $a(PQKB)10715722 035 $a(StDuBDS)EDZ0000165606 035 $a(MiAaPQ)EBC3419912 035 $a(DE-B1597)484981 035 $a(OCoLC)1023999376 035 $a(DE-B1597)9780300128239 035 $a(Au-PeEL)EBL3419912 035 $a(CaPaEBR)ebr10169938 035 $a(CaONFJC)MIL172168 035 $a(OCoLC)923588423 035 $a(EXLCZ)991000000000471903 100 $a20011026d2002 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWhat to listen for in rock$b[electronic resource] $ea stylistic analysis /$fKen Stephenson 210 $aNew Haven $cYale University Press$dc2002 215 $a1 online resource (1 online resource (xvii, 253 p.) )$cmusic 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-300-09239-3 320 $aIncludes discography (p. 195-196), bibliographical references (p. 197-217), and index. 327 $aPhrase rhythm -- Key and mode -- Cadences -- Chord type and harmonic palette -- Harmonic succession -- Form -- Analyzing a hit. 330 $aIn this concise and engaging analysis of rock music, music theorist Ken Stephenson explores the features that make this internationally popular music distinct from earlier music styles. The author offers a guided tour of rock music from the 1950's to the present, emphasizing the theoretical underpinnings of the style and, for the first time, systematically focusing not on rock music's history or sociology, but on the structural aspects of the music itself. What structures normally happen in rock music? What theoretical systems or models might best explain them? The book addresses these questions and more in chapters devoted to phrase rhythm, scales, key determination, cadences, harmonic palette and succession, and form. Each chapter provides richly detailed analyses of individual rock pieces from groups including Chicago; the Beatles; Emerson, Lake, and Palmer; Kansas; and others. Stephenson shows how rock music is stylistically unique, and he demonstrates how the features that make it distinct have tended to remain constant throughout the past half-century and within most substyles. For music students at the college level and for practicing rock musicians who desire a deeper understanding of their music, this book is an essential resource. 606 $aRock music$xAnalysis, appreciation 608 $aElectronic books. 615 0$aRock music$xAnalysis, appreciation. 676 $a781.66/117 700 $aStephenson$b Ken$f1959-$01055875 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451981903321 996 $aWhat to listen for in rock$92489657 997 $aUNINA LEADER 09770nam 22006133 450 001 9910915783003321 005 20240407090435.0 010 $a0-7503-4572-1 035 $a(MiAaPQ)EBC31253029 035 $a(Au-PeEL)EBL31253029 035 $a(CKB)31356161700041 035 $a(Exl-AI)31253029 035 $a(EXLCZ)9931356161700041 100 $a20240407d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Security Solutions for Multimedia 205 $a1st ed. 210 1$aBristol :$cInstitute of Physics Publishing,$d2021. 210 4$dİ2021. 215 $a1 online resource (276 pages) 225 1 $aIOP Ebooks Series 311 $a0-7503-3736-2 327 $aIntro -- Preface -- Acknowledgements -- Editor biographies -- Irshad Ahmad Ansari -- Varun Bajaj -- Contributor biographies -- Mahdie Abazar -- Parmeshwar Birajadar -- Seyed Mostafa FakhrAhmad -- Vikram M Gadre -- Ali Ghorbani -- Jay Gohil -- Abdelhamid Helali -- Sunil Kumar Jauhar -- Ameya Kshirsagar -- S Kuppa -- Hassen Maaref -- V M Manikandan -- Suja Cherukullapurath Mana -- Peyman Masjedi -- Ridha Mghaieth -- Amina Msolli -- Esmaeil Najafi -- Akash S Palde -- Jay Patel -- D S Raghukumar -- Vishal Rajput -- Antti Rissanen -- Marjo Rissanen -- T Saipraba -- Sagar G Sangodkar -- Manan Shah -- Tarun Kumar Sharma -- Rishi Sinhal -- M Suresha -- Niranjan Suthar -- Mohammad Taheri -- Hanzhou Wu -- Chapter 1 Blind image watermarking with efficient dual restoration feature -- 1.1 Introduction -- 1.2 Literature review -- 1.3 Proposed fragile watermarking scheme -- 1.3.1 Watermark pre-processing -- 1.3.2 Watermark embedding -- 1.3.3 Watermark extraction -- 1.3.4 Self-recovery process -- 1.4 Experimental results and discussion -- 1.4.1 Tamper detection anaylsis -- 1.4.2 Self-recovery of the tampered portion -- 1.5 Conclusion -- Acknowledgements -- References -- Chapter 2 Secure, robust and imperceptible image watermarking scheme based on sharp frequency localized contourlet transform -- 2.1 Introduction -- 2.2 The properties of SFLCT -- 2.3 The proposed SFLCT watermarking scheme -- 2.3.1 Computing strength factors -- 2.4 Implementations and results of the proposed SFLCT scheme -- 2.4.1 Robustness of the proposed SFLCT scheme -- 2.4.2 The security examination of the proposed scheme -- 2.5 Comparative analysis of the proposed scheme -- 2.6 Conclusion -- References -- Chapter 3 Content watermarking and data hiding in multimedia security -- 3.1 Introduction -- 3.2 Content watermarking in multimedia security -- 3.2.1 Introduction. 327 $a3.2.2 Content watermarking technique reviews -- 3.2.3 Table pertaining to research work on content watermarking in multimedia security -- 3.2.4 Inference -- 3.3 Data hiding in multimedia security -- 3.3.1 Background -- 3.3.2 Data hiding technique reviews -- 3.3.3 Table pertaining to research work on data hiding in multimedia security -- 3.3.4 Inference -- 3.4 Conclusion -- Acknowledgments -- References -- Chapter 4 Recent advances in reversible watermarking in an encrypted domain -- 4.1 Introduction -- 4.2 Preliminaries -- 4.2.1 Cover source and formats -- 4.2.2 Encryption methods -- 4.2.3 Evaluation metrics -- 4.2.4 Auxiliary data -- 4.3 State-of-the-art methods -- 4.3.1 General framework -- 4.3.2 Reserving room after encryption -- 4.3.3 Reserving room before encryption -- 4.3.4 Challenges and opportunities -- 4.4 Conclusion -- Acknowledgements -- References -- Chapter 5 An analysis of deep steganography and steganalysis -- 5.1 Introduction -- 5.2 Deep learning -- 5.2.1 Steganalysis -- 5.2.2 Steganography -- 5.3 Conclusion -- References -- Chapter 6 Recent trends in reversible data hiding techniques -- 6.1 Introduction -- 6.2 Types of RDH schemes -- 6.2.1 RDH in natural images -- 6.2.2 RDH in encrypted images -- 6.2.3 RDH through encryption (RDHTE) -- 6.3 Analysis of RDH schemes -- 6.4 Image dataset for experimental study -- 6.5 Future scope of the research in RDH -- 6.6 Conclusion -- References -- Chapter 7 Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding -- 7.1 Introduction -- 7.2 Hurdles in conventional approaches for security -- 7.2.1 Vulnerability due to expansion -- 7.2.2 Authentication and computational latency -- 7.2.3 Discrepancy in authentication -- 7.3 Vulnerability to multimedia content -- 7.3.1 Data disclosure -- 7.3.2 Content manipulation. 327 $a7.3.3 Link sharing -- 7.3.4 Steganography -- 7.3.5 Common workspace -- 7.4 Analysis of security solutions for multimedia content -- 7.4.1 Cryptography -- 7.4.2 Data hiding -- 7.4.3 Deep learning enabled authentication -- 7.5 Future scope -- 7.6 Conclusion -- Acknowledgements -- References -- Chapter 8 New lightweight image encryption algorithm for the Internet of Things and wireless multimedia sensor networks -- 8.1 Introduction -- 8.2 Cryptographic primitives -- 8.2.1 Cryptanalysis -- 8.2.2 Cryptography system -- 8.3 Proposed lightweight algorithm -- 8.4 Safety assessment -- 8.4.1 Statistical analysis -- 8.4.2 Sensitivity test: robustness against differential attacks -- 8.4.3 Calculations speed analysis -- 8.5 Conclusion -- References -- Chapter 9 Applying the capabilities of machine learning for multimedia security: an analysis -- 9.1 Introduction -- 9.2 Overview of machine learning -- 9.2.1 Classification -- 9.2.2 Regression -- 9.2.3 Deep learning -- 9.3 Machine learning algorithms for multimedia security -- 9.4 Advantages of using ML based security mechanism for multimedia -- 9.5 Conclusion -- References -- Chapter 10 Assistive communication technology options for elderly care -- 10.1 Introduction -- 10.2 Cameras for patient monitoring in hospitals -- 10.2.1 Cameras for patient supervising in elderly care -- 10.2.2 Extending camera monitoring from the hospital to the home -- 10.2.3 Home-access video service as experienced by family members -- 10.2.4 Home-access video service as experienced by staff -- 10.2.5 New contexts and possibilities for camera surveillance in elderly care -- 10.3 Home-access monitoring and security -- 10.4 Benefits of the service -- 10.4.1 Benefit for the hospital patient -- 10.4.2 Benefit to the patient's relatives -- 10.4.3 Benefit to the organization -- 10.5 Requirements for the service model. 327 $a10.5.1 When is a home-access camera a facet of quality? -- 10.5.2 Conditions for practice -- 10.6 Security issues in networked health infrastructure -- 10.6.1 Information security at the strategic level -- 10.6.2 Different layers of security -- 10.6.3 Key elements of safe IT infrastructure in healthcare in the future -- 10.7 Deploying novel surveillance services in healthcare -- 10.7.1 Underlining the basics -- 10.7.2 Design cycles and relevant frames for design -- 10.7.3 Shared leadership -- 10.7.4 Challenges of innovation adaptation -- 10.7.5 New service models and translational design challenges -- 10.8 Conclusion -- References -- Chapter 11 Deep learning approach for scenario-based abnormality detection -- 11.1 Introduction -- 11.2 Literature study -- 11.3 Scenario understanding -- 11.3.1 Key frame extraction using instance segmentation -- 11.3.2 State full artifacts modelling -- 11.3.3 Action recognition and attention of key action -- 11.3.4 A hybrid model for spatio-temporal features -- 11.3.5 Classification and captioning -- 11.4 Abnormality detection -- 11.4.1 Natural abnormality translation -- 11.5 Datasets -- 11.6 Challenges -- 11.7 Trends and strengths -- 11.8 Conclusion -- References -- Chapter 12 Ear recognition for multimedia security -- 12.1 Introduction -- 12.1.1 Components of a biometric system -- 12.1.2 Modes of operation -- 12.1.3 Performance evaluation metrics -- 12.2 Ear recognition -- 12.3 Ear detection -- 12.4 Ear feature extraction -- 12.4.1 Multiresolution technique for feature extraction -- 12.4.2 Deep learning technique for feature extraction -- 12.4.3 Identification and verification experiments -- 12.5 Conclusion -- Acknowledgements -- References -- Chapter 13 Secure multimedia management: currents trends and future avenues -- 13.1 Introduction -- 13.2 Data collection and screening -- 13.3 Results. 327 $a13.3.1 General performance of selected publications -- 13.3.2 Performance of countries, institutions, and authors -- 13.3.3 Performance of journals, citations, and keywords -- 13.3.4 Factorial analysis -- 13.3.5 Co-citation network -- 13.3.6 Collaboration worldwide -- 13.4 Conclusion -- References. 330 $aThis book is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in the multimedia domain by reviewing present and evolving security solutions, including machine learning applications, their limitations, and future research directions. 410 0$aIOP Ebooks Series 606 $aData encryption (Computer science)$7Generated by AI 606 $aDigital watermarking$7Generated by AI 615 0$aData encryption (Computer science) 615 0$aDigital watermarking. 700 $aAnsari$b Irshad Ahmad$01741364 701 $aBajaj$b Varun$01741363 701 $aSinhal$b Rishi$01779711 701 $aSharma$b Tarun Kumar$01231810 701 $aNajafi$b Esmaeil$01779712 701 $aShah$b Manan$01779713 701 $aGohil$b Jay$01779714 701 $aPatel$b Jay$01779715 701 $aWu$b Hanzhou$01779716 701 $aAbazar$b Mahdie$01779717 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910915783003321 996 $aAdvanced Security Solutions for Multimedia$94303278 997 $aUNINA