Fortressing Pixels - (Security) by Subhrajyoti Deb & Adnan Abdul-Aziz Gutub & Aditya Kumar Sahu (Hardcover)
About this item
Highlights
- Emerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things, blockchain, encryption, and quantum cryptography are required to meet multimedia data's evolving needs and security requirements.
- Author(s): Subhrajyoti Deb & Adnan Abdul-Aziz Gutub & Aditya Kumar Sahu
- 350 Pages
- Technology, Imaging Systems
- Series Name: Security
Description
About the Book
The authors investigate the design and implementation of effective security solutions to secure and control unauthorized access or manipulation of pixels within a digital image or graphical user interface, and their integration in multimedia applications to ensure authenticity and integrity in the digital age.
Book Synopsis
Emerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things, blockchain, encryption, and quantum cryptography are required to meet multimedia data's evolving needs and security requirements. In digital imaging, a pixel is the smallest element of an image that can be manipulated through software. Pixels within a digital image or graphical user interface must be secured to control unauthorized access or manipulation.
In this edited book, the contributors investigate the design and implementation of effective security solutions and their integration in multimedia applications to ensure authenticity and integrity in the digital age. Coverage includes how to secure pixels within a digital image or graphical user interface to control unauthorized access or manipulation.
Fortressing Pixels: Information security for images, videos, audio and beyond is intended to equip the readers with the knowledge and mechanisms required to safeguard assets and protect their innovative creations, business interests, and private sensitive data. Academic researchers and engineers, will find a useful resource in this book, as will industry technology professionals working in cybersecurity, forensics, computing, networking, image processing and multimedia data science.