Cryptography and Its Applications in Information Security |
Autore | Assad Safwan El |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (202 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
bit independence criterion
bit independence RC4 stream cipher complexity chaos-based stream cipher SPCNG 3D chebyshev logistic skew-tent FPGA performance museum digital copyright management blockchain smart contract authorization model coupled map lattice intermittent jumping multi-chaos public key exchange security asymmetric asymmetric algorithm cryptography framework limited computational power computationally biased intrusion detection systems machine learning communication digital cash privacy privacy preserving homomorphic encryption federated learning |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910566470303321 |
Assad Safwan El
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Multimedia security . Volume 1 Authentication and data hiding / / William Puech, editor |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd., , [2022] |
Descrizione fisica | 1 online resource (317 pages) |
Disciplina | 006.7 |
Soggetto topico | Multimedia systems |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-90180-4
1-119-90178-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555254203321 |
Hoboken, New Jersey : , : ISTE Ltd., , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Multimedia security . Volume 1 Authentication and data hiding / / William Puech, editor |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd., , [2022] |
Descrizione fisica | 1 online resource (317 pages) |
Disciplina | 006.7 |
Collana | Sciences. Images. Compression, coding and protection of images and videos |
Soggetto topico | Multimedia systems - Security measures |
ISBN |
1-119-90180-4
1-119-90178-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef̈vre, Philippe Carř, Philippe Gaborit -- Invisibility / Pascal Lef̈vre, Philippe Carř, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Řmi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / Šbastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / Řmi Cogranne, Marc Chaumont, Patrick Bas. |
Record Nr. | UNINA-9910831034703321 |
Hoboken, New Jersey : , : ISTE Ltd., , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Multimedia security 2 : biometrics, video surveillance and multimedia encryption / / edited by William Puech |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , [2022] |
Descrizione fisica | 1 online resource (320 pages) |
Disciplina | 006.7 |
Soggetto topico |
Interactive multimedia
Multimedia systems Artificial intelligence |
ISBN |
1-119-98739-3
1-394-15038-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data -- 1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction -- 3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a region from the same document -- 3.2.3. Copy-and-paste of a region from another document -- 3.2.4. Deleting information -- 3.3. Degradation in printed and re-scanned documents -- 3.3.1. Degradations linked to the print process -- 3.3.2. Degradations linked to scanning -- 3.3.3. Degradation models -- 3.4. Active approaches: protection by extrinsic fingerprints -- 3.4.1. Watermarking a document -- 3.4.2. Digital signatures -- 3.5. Passive approaches: detecting intrinsic characteristics -- 3.5.1. Printer identification -- 3.5.2. Detecting graphical clues -- 3.5.3. Other approaches.
3.6. Conclusion -- 3.7. References -- Chapter 4. Image Crypto-Compression -- 4.1. Introduction -- 4.2. Preliminary notions -- 4.2.1. The JPEG image format -- 4.2.2. Introduction to cryptography -- 4.3. Image encryption -- 4.3.1. Naive methods -- 4.3.2. Chaos-based methods -- 4.3.3. Encryption-then-compression -- 4.4. Different classes of crypto-compression for images -- 4.4.1. Substitution-based crypto-compression -- 4.4.2. Shuffle-based crypto-compression -- 4.4.3. Hybrid crypto-compression -- 4.5. Recompressing crypto-compressed JPEG images -- 4.5.1. A crypto-compression approach robust to recompression -- 4.5.2. Recompression of a crypto-compressed image -- 4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image -- 4.5.4. Illustration of the method -- 4.6. Conclusion -- 4.7. References -- Chapter 5. Crypto-Compression of Videos -- 5.1. Introduction -- 5.1.1. Background -- 5.1.2. Video compression -- 5.1.3. Video security -- 5.2. State of the art -- 5.2.1. Naive encryption -- 5.2.2. Partial encryption -- 5.2.3. Perceptual encryption -- 5.2.4. Crypto-compression methods -- 5.2.5. Selective encryption methods -- 5.3. Format-compliant selective encryption -- 5.3.1. Properties -- 5.3.2. Constant bitrate format compliant selective encryption -- 5.3.3. Standardized selective encryption -- 5.3.4. Locally applied selective encryption -- 5.3.5. Decrypting selective encryption -- 5.4. Image and video quality -- 5.4.1. Experiments on encryption solutions -- 5.4.2. Video quality: experimental results -- 5.4.3. CSE: a complete real-time solution -- 5.5. Perspectives and directions for future research -- 5.5.1. Versatile Video Coding -- 5.5.2. Immersive and omnidirectinal video -- 5.6. Conclusion -- 5.7. References -- Chapter 6. Processing Encrypted Multimedia Data Using Homomorphic Encryption -- 6.1. Context. 6.2. Different classes of homomorphic encryption systems -- 6.2.1. Partial solutions in classic cryptography -- 6.2.2. Complete solutions in cryptography using Euclidean networks -- 6.3. From theory to practice -- 6.3.1. Algorithmics -- 6.3.2. Implementation and optimization -- 6.3.3. Managing and reducing the size of encrypted elements -- 6.3.4. Security -- 6.4. Proofs of concept and applications -- 6.4.1. Facial recognition -- 6.4.2. Classification -- 6.4.3. RLE and image compression -- 6.5. Conclusion -- 6.6. Acknowledgments -- 6.7. References -- Chapter 7. Data Hiding in the Encrypted Domain -- 7.1. Introduction: processing multimedia data in the encrypted domain -- 7.1.1. Applications: visual secret sharing -- 7.1.2. Applications: searching and indexing in encrypted image databases -- 7.1.3. Applications: data hiding in the encrypted domain -- 7.2. Main aims -- 7.2.1. Digital rights management -- 7.2.2. Cloud storage -- 7.2.3. Preserving patient confidentiality -- 7.2.4. Classified data -- 7.2.5. Journalism -- 7.2.6. Video surveillance -- 7.2.7. Data analysis -- 7.3. Classes and characteristics -- 7.3.1. Properties -- 7.3.2. Classic approaches to encryption -- 7.3.3. Evaluation criteria -- 7.4. Principal methods -- 7.4.1. Image partitioning -- 7.4.2. Histogram shifting -- 7.4.3. Encoding -- 7.4.4. Prediction -- 7.4.5. Public key encryption -- 7.5. Comparison and discussion -- 7.6. A high-capacity data hiding approach based on MSB prediction -- 7.6.1. General description of the method -- 7.6.2. The CPE-HCRDH approach -- 7.6.3. The EPE-HCRDH approach -- 7.6.4. Experimental results for both approaches -- 7.7. Conclusion -- 7.8. References -- Chapter 8. Sharing Secret Images and 3D Objects -- 8.1. Introduction -- 8.2. Secret sharing -- 8.2.1. Classic methods -- 8.2.2. Hierarchical aspects -- 8.3. Secret image sharing -- 8.3.1. Principle. 8.3.2. Visual cryptography -- 8.3.3. Secret image sharing (polynomial-based) -- 8.3.4. Properties -- 8.4. 3D object sharing -- 8.4.1. Principle -- 8.4.2. Methods without format preservation -- 8.4.3. Methods with format preservation -- 8.5. Applications for social media -- 8.6. Conclusion -- 8.7. References -- List of Authors -- Index -- EULA. |
Record Nr. | UNINA-9910585799903321 |
Hoboken, New Jersey : , : John Wiley & Sons, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Multimedia security 2 : biometrics, video surveillance and multimedia encryption / / edited by William Puech |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , [2022] |
Descrizione fisica | 1 online resource (320 pages) |
Disciplina | 006.7 |
Collana | Sciences. image. compression, coding and protection of images and videos |
Soggetto topico | Multimedia systems - Security measures |
ISBN |
1-119-98739-3
1-394-15038-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data -- 1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction -- 3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a region from the same document -- 3.2.3. Copy-and-paste of a region from another document -- 3.2.4. Deleting information -- 3.3. Degradation in printed and re-scanned documents -- 3.3.1. Degradations linked to the print process -- 3.3.2. Degradations linked to scanning -- 3.3.3. Degradation models -- 3.4. Active approaches: protection by extrinsic fingerprints -- 3.4.1. Watermarking a document -- 3.4.2. Digital signatures -- 3.5. Passive approaches: detecting intrinsic characteristics -- 3.5.1. Printer identification -- 3.5.2. Detecting graphical clues -- 3.5.3. Other approaches.
3.6. Conclusion -- 3.7. References -- Chapter 4. Image Crypto-Compression -- 4.1. Introduction -- 4.2. Preliminary notions -- 4.2.1. The JPEG image format -- 4.2.2. Introduction to cryptography -- 4.3. Image encryption -- 4.3.1. Naive methods -- 4.3.2. Chaos-based methods -- 4.3.3. Encryption-then-compression -- 4.4. Different classes of crypto-compression for images -- 4.4.1. Substitution-based crypto-compression -- 4.4.2. Shuffle-based crypto-compression -- 4.4.3. Hybrid crypto-compression -- 4.5. Recompressing crypto-compressed JPEG images -- 4.5.1. A crypto-compression approach robust to recompression -- 4.5.2. Recompression of a crypto-compressed image -- 4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image -- 4.5.4. Illustration of the method -- 4.6. Conclusion -- 4.7. References -- Chapter 5. Crypto-Compression of Videos -- 5.1. Introduction -- 5.1.1. Background -- 5.1.2. Video compression -- 5.1.3. Video security -- 5.2. State of the art -- 5.2.1. Naive encryption -- 5.2.2. Partial encryption -- 5.2.3. Perceptual encryption -- 5.2.4. Crypto-compression methods -- 5.2.5. Selective encryption methods -- 5.3. Format-compliant selective encryption -- 5.3.1. Properties -- 5.3.2. Constant bitrate format compliant selective encryption -- 5.3.3. Standardized selective encryption -- 5.3.4. Locally applied selective encryption -- 5.3.5. Decrypting selective encryption -- 5.4. Image and video quality -- 5.4.1. Experiments on encryption solutions -- 5.4.2. Video quality: experimental results -- 5.4.3. CSE: a complete real-time solution -- 5.5. Perspectives and directions for future research -- 5.5.1. Versatile Video Coding -- 5.5.2. Immersive and omnidirectinal video -- 5.6. Conclusion -- 5.7. References -- Chapter 6. Processing Encrypted Multimedia Data Using Homomorphic Encryption -- 6.1. Context. 6.2. Different classes of homomorphic encryption systems -- 6.2.1. Partial solutions in classic cryptography -- 6.2.2. Complete solutions in cryptography using Euclidean networks -- 6.3. From theory to practice -- 6.3.1. Algorithmics -- 6.3.2. Implementation and optimization -- 6.3.3. Managing and reducing the size of encrypted elements -- 6.3.4. Security -- 6.4. Proofs of concept and applications -- 6.4.1. Facial recognition -- 6.4.2. Classification -- 6.4.3. RLE and image compression -- 6.5. Conclusion -- 6.6. Acknowledgments -- 6.7. References -- Chapter 7. Data Hiding in the Encrypted Domain -- 7.1. Introduction: processing multimedia data in the encrypted domain -- 7.1.1. Applications: visual secret sharing -- 7.1.2. Applications: searching and indexing in encrypted image databases -- 7.1.3. Applications: data hiding in the encrypted domain -- 7.2. Main aims -- 7.2.1. Digital rights management -- 7.2.2. Cloud storage -- 7.2.3. Preserving patient confidentiality -- 7.2.4. Classified data -- 7.2.5. Journalism -- 7.2.6. Video surveillance -- 7.2.7. Data analysis -- 7.3. Classes and characteristics -- 7.3.1. Properties -- 7.3.2. Classic approaches to encryption -- 7.3.3. Evaluation criteria -- 7.4. Principal methods -- 7.4.1. Image partitioning -- 7.4.2. Histogram shifting -- 7.4.3. Encoding -- 7.4.4. Prediction -- 7.4.5. Public key encryption -- 7.5. Comparison and discussion -- 7.6. A high-capacity data hiding approach based on MSB prediction -- 7.6.1. General description of the method -- 7.6.2. The CPE-HCRDH approach -- 7.6.3. The EPE-HCRDH approach -- 7.6.4. Experimental results for both approaches -- 7.7. Conclusion -- 7.8. References -- Chapter 8. Sharing Secret Images and 3D Objects -- 8.1. Introduction -- 8.2. Secret sharing -- 8.2.1. Classic methods -- 8.2.2. Hierarchical aspects -- 8.3. Secret image sharing -- 8.3.1. Principle. 8.3.2. Visual cryptography -- 8.3.3. Secret image sharing (polynomial-based) -- 8.3.4. Properties -- 8.4. 3D object sharing -- 8.4.1. Principle -- 8.4.2. Methods without format preservation -- 8.4.3. Methods with format preservation -- 8.5. Applications for social media -- 8.6. Conclusion -- 8.7. References -- List of Authors -- Index -- EULA. |
Record Nr. | UNINA-9910830058003321 |
Hoboken, New Jersey : , : John Wiley & Sons, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|