LEADER 04570nam 22007215 450 001 9910633913203321 005 20250808113319.0 010 $a3-031-05491-1 024 7 $a10.1007/978-3-031-05491-4 035 $a(MiAaPQ)EBC7150303 035 $a(Au-PeEL)EBL7150303 035 $a(CKB)25504476500041 035 $a(PPN)266350542 035 $a(DE-He213)978-3-031-05491-4 035 $a(EXLCZ)9925504476500041 100 $a20221129d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications /$fedited by George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (406 pages) 225 1 $aSmart Innovation, Systems and Technologies,$x2190-3026 ;$v314 311 08$aPrint version: Tsihrintzis, George A. 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications Cham : Springer International Publishing AG,c2023 9783031054907 320 $aIncludes bibliographical references. 327 $aReversible Data Hiding in Encrypted Image Based on MSB Inversion -- Comments on the Visual Binary QR Code -- NLP-based Hardware Solution for Censoring Audio on Over-the-top (OTT) Media Services -- Efficient Steganographic Method Based on Modulo Cube -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- An RFID Ownership Transfer based on Multiple Owners with Different Weights -- Fuzzy C-Means based Feature Selection Mechanism for Wireless Intrusion Detection -- Real Time Drowsiness Detection Based on Facial Dynamic Features -- Collision Avoidance in Crowded Zone using Adversarial Reinforcement Learning -- Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology. 330 $aThis book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. 410 0$aSmart Innovation, Systems and Technologies,$x2190-3026 ;$v314 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aEngineering$xData processing 606 $aBig data 606 $aEngineering mathematics 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aData Engineering 606 $aBig Data 606 $aMathematical and Computational Engineering Applications 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aEngineering$xData processing. 615 0$aBig data. 615 0$aEngineering mathematics. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aData Engineering. 615 24$aBig Data. 615 24$aMathematical and Computational Engineering Applications. 676 $a006.3 676 $a006.3 702 $aTsihrintzis$b George A. 702 $aWang$b Shiuh-Jeng 702 $aLin$b Iuon-Chang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910633913203321 996 $a2021 International conference on security and information technologies with AI, internet computing and big-data applications$93090377 997 $aUNINA