Cargando…

Multimedia security 2 : Biometrics, video surveillance and multimedia encryption /

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Puech, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : London : Wiley ; ISTE, [2022]
Colección:Sciences. image. compression, coding and protection of images and videos
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1328576927
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 220530s2022 njua ob 001 0 eng d
040 |a RBN  |b eng  |e rda  |e pn  |c RBN  |d YDX  |d OCLCQ  |d DG1  |d ORMDA  |d IEEEE  |d OCLCQ  |d N$T  |d OCLCQ  |d OCLCO 
020 |a 9781394150380  |q (electronic bk.) 
020 |a 1394150385  |q (electronic bk.) 
020 |a 9781119987390  |q (electronic book) 
020 |a 1119987393  |q (electronic book) 
020 |a 9781394150397  |q (electronic bk.) 
020 |a 1394150393  |q (electronic bk.) 
020 |z 9781789450279 
024 7 |a 10.1002/9781119987390  |2 doi 
029 1 |a AU@  |b 000072428051 
035 |a (OCoLC)1328576927 
037 |a 9781789450279  |b O'Reilly Media 
037 |a 9980470  |b IEEE 
050 4 |a QA76.575  |b .P84 2022 
082 0 4 |a 006.7  |2 23 
049 |a UAMI 
245 0 0 |a Multimedia security 2 :  |b Biometrics, video surveillance and multimedia encryption /  |c Coordinated by William Puech. 
246 3 |a Biometrics, video surveillance and multimedia encryption 
264 1 |a Hoboken, NJ :  |b Wiley ;  |a London :  |b ISTE,  |c [2022] 
300 |a 1 online resource (320 pages :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Sciences. image. compression, coding and protection of images and videos 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data -- 1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction -- 3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a region from the same document -- 3.2.3. Copy-and-paste of a region from another document -- 3.2.4. Deleting information -- 3.3. Degradation in printed and re-scanned documents -- 3.3.1. Degradations linked to the print process -- 3.3.2. Degradations linked to scanning -- 3.3.3. Degradation models -- 3.4. Active approaches: protection by extrinsic fingerprints -- 3.4.1. Watermarking a document -- 3.4.2. Digital signatures -- 3.5. Passive approaches: detecting intrinsic characteristics -- 3.5.1. Printer identification -- 3.5.2. Detecting graphical clues -- 3.5.3. Other approaches. 
505 8 |a 3.6. Conclusion -- 3.7. References -- Chapter 4. Image Crypto-Compression -- 4.1. Introduction -- 4.2. Preliminary notions -- 4.2.1. The JPEG image format -- 4.2.2. Introduction to cryptography -- 4.3. Image encryption -- 4.3.1. Naive methods -- 4.3.2. Chaos-based methods -- 4.3.3. Encryption-then-compression -- 4.4. Different classes of crypto-compression for images -- 4.4.1. Substitution-based crypto-compression -- 4.4.2. Shuffle-based crypto-compression -- 4.4.3. Hybrid crypto-compression -- 4.5. Recompressing crypto-compressed JPEG images -- 4.5.1. A crypto-compression approach robust to recompression -- 4.5.2. Recompression of a crypto-compressed image -- 4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image -- 4.5.4. Illustration of the method -- 4.6. Conclusion -- 4.7. References -- Chapter 5. Crypto-Compression of Videos -- 5.1. Introduction -- 5.1.1. Background -- 5.1.2. Video compression -- 5.1.3. Video security -- 5.2. State of the art -- 5.2.1. Naive encryption -- 5.2.2. Partial encryption -- 5.2.3. Perceptual encryption -- 5.2.4. Crypto-compression methods -- 5.2.5. Selective encryption methods -- 5.3. Format-compliant selective encryption -- 5.3.1. Properties -- 5.3.2. Constant bitrate format compliant selective encryption -- 5.3.3. Standardized selective encryption -- 5.3.4. Locally applied selective encryption -- 5.3.5. Decrypting selective encryption -- 5.4. Image and video quality -- 5.4.1. Experiments on encryption solutions -- 5.4.2. Video quality: experimental results -- 5.4.3. CSE: a complete real-time solution -- 5.5. Perspectives and directions for future research -- 5.5.1. Versatile Video Coding -- 5.5.2. Immersive and omnidirectinal video -- 5.6. Conclusion -- 5.7. References -- Chapter 6. Processing Encrypted Multimedia Data Using Homomorphic Encryption -- 6.1. Context. 
505 8 |a 6.2. Different classes of homomorphic encryption systems -- 6.2.1. Partial solutions in classic cryptography -- 6.2.2. Complete solutions in cryptography using Euclidean networks -- 6.3. From theory to practice -- 6.3.1. Algorithmics -- 6.3.2. Implementation and optimization -- 6.3.3. Managing and reducing the size of encrypted elements -- 6.3.4. Security -- 6.4. Proofs of concept and applications -- 6.4.1. Facial recognition -- 6.4.2. Classification -- 6.4.3. RLE and image compression -- 6.5. Conclusion -- 6.6. Acknowledgments -- 6.7. References -- Chapter 7. Data Hiding in the Encrypted Domain -- 7.1. Introduction: processing multimedia data in the encrypted domain -- 7.1.1. Applications: visual secret sharing -- 7.1.2. Applications: searching and indexing in encrypted image databases -- 7.1.3. Applications: data hiding in the encrypted domain -- 7.2. Main aims -- 7.2.1. Digital rights management -- 7.2.2. Cloud storage -- 7.2.3. Preserving patient confidentiality -- 7.2.4. Classified data -- 7.2.5. Journalism -- 7.2.6. Video surveillance -- 7.2.7. Data analysis -- 7.3. Classes and characteristics -- 7.3.1. Properties -- 7.3.2. Classic approaches to encryption -- 7.3.3. Evaluation criteria -- 7.4. Principal methods -- 7.4.1. Image partitioning -- 7.4.2. Histogram shifting -- 7.4.3. Encoding -- 7.4.4. Prediction -- 7.4.5. Public key encryption -- 7.5. Comparison and discussion -- 7.6. A high-capacity data hiding approach based on MSB prediction -- 7.6.1. General description of the method -- 7.6.2. The CPE-HCRDH approach -- 7.6.3. The EPE-HCRDH approach -- 7.6.4. Experimental results for both approaches -- 7.7. Conclusion -- 7.8. References -- Chapter 8. Sharing Secret Images and 3D Objects -- 8.1. Introduction -- 8.2. Secret sharing -- 8.2.1. Classic methods -- 8.2.2. Hierarchical aspects -- 8.3. Secret image sharing -- 8.3.1. Principle. 
505 8 |a 8.3.2. Visual cryptography -- 8.3.3. Secret image sharing (polynomial-based) -- 8.3.4. Properties -- 8.4. 3D object sharing -- 8.4.1. Principle -- 8.4.2. Methods without format preservation -- 8.4.3. Methods with format preservation -- 8.5. Applications for social media -- 8.6. Conclusion -- 8.7. References -- List of Authors -- Index -- EULA. 
588 0 |a Online resource; title from digital title page (viewed on July 19, 2022). 
520 |a Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Multimedia systems  |x Security measures. 
650 6 |a Multimédia  |x Sécurité  |x Mesures. 
700 1 |a Puech, William,  |e author. 
776 0 8 |i Print version:  |a Puech, William.  |t Multimedia Security 2.  |d Newark : John Wiley & Sons, Incorporated, ©2022  |z 9781789450279 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789450279/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 302902208 
938 |a EBSCOhost  |b EBSC  |n 3292875 
994 |a 92  |b IZTAP