CHF 147.00

Multimedia Forensics and Security
Foundations, Innovations, and Applications

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

Summary

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment.  The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

Additional text

“The book discusses sparingly some techniques from multimedia forensics and watermarking. It is well organized and informative. … practitioners, researchers, faculty, and students of computer security, cybercrime, and public policy will find this book useful. It is suitable for teaching courses on multimedia forensics and security. I recommend it for its intended readers.” (Computing Reviews, November, 2017)

Report

"The book discusses sparingly some techniques from multimedia forensics and watermarking. It is well organized and informative. ... practitioners, researchers, faculty, and students of computer security, cybercrime, and public policy will find this book useful. It is suitable for teaching courses on multimedia forensics and security. I recommend it for its intended readers." (Computing Reviews, November, 2017)

Product details

Assisted by Aboul Ella Hassanien (Editor), Mohamed Mostafa Fouad (Editor), Azizah Abdul Manaf (Editor), Mazdak Zamani (Editor), Rabiah Ahmad (Editor), Janusz Kacprzyk (Editor), Mohame Mostafa Fouad (Editor), Azizah Abdul Manaf et al (Editor)
Publisher Springer, Berlin
 
Content Book
Product form Paperback / Softback
Publication date 01.01.2018
Subject Natural sciences, medicine, IT, technology > Technology > General, dictionaries
 
EAN 9783319830261
ISBN 978-3-31-983026-1
Pages 414
Illustrations XI, 414 p. 166 illus., 98 illus. in color.
Dimensions (packing) 15.5 x 2.3 x 23.5 cm
Weight (packing) 652 g
 
Series Intelligent Systems Reference Library > .115
Intelligent Systems Reference Library
Subjects Computersicherheit, B, Netzwerksicherheit, Rechtsmedizin, Forensik, Artificial Intelligence, Sicherheitssysteme und Brandmeldeanlagen, engineering, data protection, Systems and Data Security, Data and Information Security, Forensic Medicine, Network Security, Computer security, Computational Intelligence, Security Science and Technology, Security and fire alarm systems, Medical jurisprudence, Security systems
 

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.