Multimedia Watermarking (Record no. 87525)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03494nam a22005775i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-99-9803-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171333.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240221s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819998036 |
-- | 978-981-99-9803-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Multimedia Watermarking |
Sub Title | Latest Developments and Trends / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XII, 136 p. 37 illus., 20 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1. Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA -- 2. Digital Watermarking - Pathway to Secure! -- 3. Secured Digital Watermarking using Neural Networks -- 4. The Impact of Denoising in Watermarking Robustness -- 5. A Watermark Challenge: Synthetic Speech Detection -- 6. Role of Blockchain and Watermarking towards Cyber Security -- 7. Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and forgery detection. This book provides an extensive survey from the fundamentals to cutting-edge digital watermarking techniques. One of the crucial aspects of multimedia security is the ability to detect forged/tampered regions from the multimedia object. In this book, we emphasized how tampering detection, localization, and recovery of manipulated information not only limits but also eliminates the scope of unauthorized usage. Finally, this book provides the groundwork for understanding the role of intelligent machines and blockchain in achieving better security in multimedia watermarking. Readers will find it easy to comprehend the wide variety of applications, theoretical principles, and effective solutions for protecting intellectual rights soon after reading this book. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Kumar Sahu, Aditya. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-99-9803-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Services. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Privacy. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Principles and Models of Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.