Multimedia Forensics and Security: Foundations, Innovations, and Applications
โ Scribed by Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, Janusz Kacprzyk (eds.)
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 414
- Series
- Intelligent Systems Reference Library 115
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security.
That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
โฆ Table of Contents
Front Matter....Pages i-xi
Front Matter....Pages 1-1
Cloud Computing Forensic Analysis: Trends and Challenges....Pages 3-23
Data Storage Security Service in Cloud Computing: Challenges and Solutions....Pages 25-57
Homomorphic Cryptosystems for Securing Data in Public Cloud Computing....Pages 59-75
An Enhanced Cloud Based View Materialization Approach for Peer-to-Peer Architecture....Pages 77-95
Distributed Database System (DSS) Design Over a Cloud Environment....Pages 97-116
A New Stemming Algorithm for Efficient Information Retrieval Systems and Web Search Engines....Pages 117-135
Front Matter....Pages 137-137
Face Recognition via Taxonomy of Illumination Normalization....Pages 139-160
Detecting Significant Changes in Image Sequences....Pages 161-191
VW16E: A Robust Video Watermarking Technique Using Simulated Blocks....Pages 193-221
A Robust and Computationally Efficient Digital Watermarking Technique Using Inter Block Pixel Differencing....Pages 223-252
JPEG2000 Compatible Layered Block Cipher....Pages 253-275
Front Matter....Pages 277-277
Data Streams Processing Techniques....Pages 279-305
Evidence Evaluation of Gait Biometrics for Forensic Investigation....Pages 307-326
Formal Acceptability of Digital Evidence....Pages 327-348
A Comprehensive Android Evidence Acquisition Framework....Pages 349-364
A New Hybrid Cryptosystem for Internet of Things Applications....Pages 365-380
A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack....Pages 381-414
โฆ Subjects
Computational Intelligence;Artificial Intelligence (incl. Robotics);Forensic Medicine;Systems and Data Security;Security Science and Technology
๐ SIMILAR VOLUMES
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research
<p><strong>Multimedia Security: Watermarking, Steganography, and Forensics</strong> outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content
ะะทะดะฐัะตะปัััะฒะพ CRC Press, 2013, -411 pp.<div class="bb-sep"></div>Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered