Applications of Encryption and Watermarking for Information Security

Applications of Encryption and Watermarking for Information Security

Release Date: March, 2023|Copyright: © 2023 |Pages: 245
DOI: 10.4018/978-1-6684-4945-5
ISBN13: 9781668449455|ISBN10: 1668449455|EISBN13: 9781668449479
Hardcover:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$290.00
TOTAL SAVINGS: $290.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$290.00
TOTAL SAVINGS: $290.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$2,550.00
TOTAL SAVINGS: $2,550.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area.

Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their understanding of the strategic role of trust at different levels of information security, that is, trust at the level of cryptography and watermarking and at the level of securing multimedia data. Covering topics such as background subtraction, moving object detection, and visual watermark identification, this premier reference source is an excellent resource for security and privacy professionals, IT managers, practitioners, students and educators of higher education, librarians, researchers, and academicians.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Background Subtraction
  • Convergence Analysis
  • Cryptography Algorithms
  • Crypto-Watermarking Methods
  • Fingerprinting
  • Medical Images Security
  • Moving Object Detection
  • Multivariable Delayed Systems
  • Speech Recognition Systems
  • Stationary Wavelet Domain
  • Video Compression
  • Video Watermarking
  • Visual Watermark Identification
Table of Contents
Search this Book:
Reset
Editor/Author Biographies

Boussif Mohamed was born in Zaghouan, Tunisia in 1989. He received a Master's thesis and a Ph.D. degree in Electronics from the Faculty of Sciences of Tunis, University of El Manar Tunis, in 2013 and 2018, respectively. In 2019, he was an assistant at the Preparatory Institute for Engineering Nabeul, Carthage University. From 2020, he is an assistant at the Higher School of Science and Technology of Hammam Sousse, University of Sousse. His research interests include multimedia data processing, security, and embedded systems. He has authored more than 10 papers on encryption and watermarking of images and co-authored more than four papers. He is a reviewer for many well-known journals.

Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.