000 | 03811nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-44270-9 | ||
003 | DE-He213 | ||
005 | 20220801215529.0 | ||
007 | cr nn 008mamaa | ||
008 | 161017s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319442709 _9978-3-319-44270-9 |
||
024 | 7 |
_a10.1007/978-3-319-44270-9 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aMultimedia Forensics and Security _h[electronic resource] : _bFoundations, Innovations, and Applications / _cedited by Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, Janusz Kacprzyk. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXI, 414 p. 166 illus., 98 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIntelligent Systems Reference Library, _x1868-4408 ; _v115 |
|
520 | _aThis book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court. | ||
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aMedical jurisprudence. _942503 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aForensic Medicine. _942505 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aHassanien, Aboul Ella. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _918087 |
|
700 | 1 |
_aMostafa Fouad, Mohamed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _944926 |
|
700 | 1 |
_aManaf, Azizah Abdul. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _944927 |
|
700 | 1 |
_aZamani, Mazdak. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _944928 |
|
700 | 1 |
_aAhmad, Rabiah. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _944929 |
|
700 | 1 |
_aKacprzyk, Janusz. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _944930 |
|
710 | 2 |
_aSpringerLink (Online service) _944931 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319442686 |
776 | 0 | 8 |
_iPrinted edition: _z9783319442693 |
776 | 0 | 8 |
_iPrinted edition: _z9783319830261 |
830 | 0 |
_aIntelligent Systems Reference Library, _x1868-4408 ; _v115 _944932 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-44270-9 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c77586 _d77586 |