000 03811nam a22006375i 4500
001 978-3-319-44270-9
003 DE-He213
005 20220801215529.0
007 cr nn 008mamaa
008 161017s2017 sz | s |||| 0|eng d
020 _a9783319442709
_9978-3-319-44270-9
024 7 _a10.1007/978-3-319-44270-9
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aMultimedia Forensics and Security
_h[electronic resource] :
_bFoundations, Innovations, and Applications /
_cedited by Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, Janusz Kacprzyk.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXI, 414 p. 166 illus., 98 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIntelligent Systems Reference Library,
_x1868-4408 ;
_v115
520 _aThis book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment.  The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
650 0 _aComputational intelligence.
_97716
650 0 _aArtificial intelligence.
_93407
650 0 _aMedical jurisprudence.
_942503
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 1 4 _aComputational Intelligence.
_97716
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aForensic Medicine.
_942505
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aHassanien, Aboul Ella.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_918087
700 1 _aMostafa Fouad, Mohamed.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_944926
700 1 _aManaf, Azizah Abdul.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_944927
700 1 _aZamani, Mazdak.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_944928
700 1 _aAhmad, Rabiah.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_944929
700 1 _aKacprzyk, Janusz.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_944930
710 2 _aSpringerLink (Online service)
_944931
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319442686
776 0 8 _iPrinted edition:
_z9783319442693
776 0 8 _iPrinted edition:
_z9783319830261
830 0 _aIntelligent Systems Reference Library,
_x1868-4408 ;
_v115
_944932
856 4 0 _uhttps://doi.org/10.1007/978-3-319-44270-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77586
_d77586