Multimedia Forensics and Security (Record no. 77586)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03811nam a22006375i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-44270-9 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801215529.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 161017s2017 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319442709 |
-- | 978-3-319-44270-9 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.3 |
245 10 - TITLE STATEMENT | |
Title | Multimedia Forensics and Security |
Sub Title | Foundations, Innovations, and Applications / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 414 p. 166 illus., 98 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Intelligent Systems Reference Library, |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court. |
700 1# - AUTHOR 2 | |
Author 2 | Hassanien, Aboul Ella. |
700 1# - AUTHOR 2 | |
Author 2 | Mostafa Fouad, Mohamed. |
700 1# - AUTHOR 2 | |
Author 2 | Manaf, Azizah Abdul. |
700 1# - AUTHOR 2 | |
Author 2 | Zamani, Mazdak. |
700 1# - AUTHOR 2 | |
Author 2 | Ahmad, Rabiah. |
700 1# - AUTHOR 2 | |
Author 2 | Kacprzyk, Janusz. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-44270-9 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2017. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Medical jurisprudence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Forensic Medicine. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1868-4408 ; |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.