000 | 03494nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-981-99-9803-6 | ||
003 | DE-He213 | ||
005 | 20240730171333.0 | ||
007 | cr nn 008mamaa | ||
008 | 240221s2024 si | s |||| 0|eng d | ||
020 |
_a9789819998036 _9978-981-99-9803-6 |
||
024 | 7 |
_a10.1007/978-981-99-9803-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMultimedia Watermarking _h[electronic resource] : _bLatest Developments and Trends / _cedited by Aditya Kumar Sahu. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXII, 136 p. 37 illus., 20 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _a1. Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA -- 2. Digital Watermarking - Pathway to Secure! -- 3. Secured Digital Watermarking using Neural Networks -- 4. The Impact of Denoising in Watermarking Robustness -- 5. A Watermark Challenge: Synthetic Speech Detection -- 6. Role of Blockchain and Watermarking towards Cyber Security -- 7. Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective. | |
520 | _aMultimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and forgery detection. This book provides an extensive survey from the fundamentals to cutting-edge digital watermarking techniques. One of the crucial aspects of multimedia security is the ability to detect forged/tampered regions from the multimedia object. In this book, we emphasized how tampering detection, localization, and recovery of manipulated information not only limits but also eliminates the scope of unauthorized usage. Finally, this book provides the groundwork for understanding the role of intelligent machines and blockchain in achieving better security in multimedia watermarking. Readers will find it easy to comprehend the wide variety of applications, theoretical principles, and effective solutions for protecting intellectual rights soon after reading this book. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aData protection _xLaw and legislation. _923450 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aPrivacy. _935098 |
650 | 2 | 4 |
_aPrinciples and Models of Security. _978911 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aKumar Sahu, Aditya. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998117 |
|
710 | 2 |
_aSpringerLink (Online service) _998120 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819998029 |
776 | 0 | 8 |
_iPrinted edition: _z9789819998043 |
776 | 0 | 8 |
_iPrinted edition: _z9789819998050 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-9803-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87525 _d87525 |