© 2017

Intelligent Techniques in Signal Processing for Multimedia Security

  • Nilanjan Dey
  • V. Santhi

Part of the Studies in Computational Intelligence book series (SCI, volume 660)

Table of contents

  1. Front Matter
    Pages i-ix
  2. Overview on Multimedia Data Security and Its Evaluation

    1. Front Matter
      Pages 1-1
    2. Amira S. Ashour, Nilanjan Dey
      Pages 3-14
    3. S. D. Desai, N. R. Pudakalakatti, V. P. Baligar
      Pages 15-45
    4. V. Thanikaiselvan, Shounak Shastri, Shaik Ahmad
      Pages 65-91
    5. H. R. Lakshmi, B. Surekha, S. Viswanadha Raju
      Pages 113-132
    6. Sayan Chakraborty, Souvik Chatterjee, Nilanjan Dey, Amira S. Ashour, Aboul Ella Hassanien
      Pages 133-149
    7. Ujwalla Gawande, Yogesh Golhar, Kamal Hajari
      Pages 151-176
  3. Personal Authentication and Recognition Systems

    1. Front Matter
      Pages 199-199
    2. M. Sivarathinabala, S. Abirami, R. Baskaran
      Pages 227-252
    3. K. Dharavath, F. A. Talukdar, R. H. Laskar, N. Dey
      Pages 253-271
    4. S. Sghaier, C. Souani, H. Faeidh, K. Besbes
      Pages 273-291
    5. Borra Surekha, Kanchan Jayant Nazare, S. Viswanadha Raju, Nilanjan Dey
      Pages 293-319
    6. J. Arunnehru, M. Kalaiselvi Geetha
      Pages 321-342
  4. Medical Security Applications

    1. Front Matter
      Pages 343-343
    2. Nilanjan Dey, Amira S. Ashour, Sayan Chakraborty, Sukanya Banerjee, Evgeniya Gospodinova, Mitko Gospodinov et al.
      Pages 345-369

About this book


This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. 

As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here.

This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.


Computational Intelligence Intelligent Systems Multimedia Security Signal Processing Intelligent Techniques

Editors and affiliations

  • Nilanjan Dey
    • 1
  • V. Santhi
    • 2
  1. 1.Department of Information TechnologyTechno India College of Technology Department of Information TechnologyKolkataIndia
  2. 2.School of Computing Science and Eng.VIT University School of Computing Science and Eng.VelloreIndia

Bibliographic information