Multimedia Forensics and Security

Foundations, Innovations, and Applications

Nonfiction, Health & Well Being, Medical, Specialties, Forensic Medicine, Computers, Advanced Computing, Artificial Intelligence, General Computing
Cover of the book Multimedia Forensics and Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319442709
Publisher: Springer International Publishing Publication: October 17, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319442709
Publisher: Springer International Publishing
Publication: October 17, 2016
Imprint: Springer
Language: English

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment.  The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment.  The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

More books from Springer International Publishing

Cover of the book E-Learning Systems by
Cover of the book Geostatistical and Geospatial Approaches for the Characterization of Natural Resources in the Environment by
Cover of the book Capacity and Inventory Planning for Make-to-Order Production Systems by
Cover of the book Fuzzy Logic of Quasi-Truth: An Algebraic Treatment by
Cover of the book Big Data and Analytics by
Cover of the book Cognitively Inspired Audiovisual Speech Filtering by
Cover of the book Sentiment Analysis in the Bio-Medical Domain by
Cover of the book The Importance of Place: Geographical Indications as a Tool for Local and Regional Development by
Cover of the book Emerging Challenges in Business, Optimization, Technology, and Industry by
Cover of the book The Eurasian Wheat Belt and Food Security by
Cover of the book Grapevine Viruses: Molecular Biology, Diagnostics and Management by
Cover of the book Right Ventricular Physiology, Adaptation and Failure in Congenital and Acquired Heart Disease by
Cover of the book Generalized Locally Toeplitz Sequences: Theory and Applications by
Cover of the book Algorithms and Architectures for Parallel Processing by
Cover of the book Game Theoretic Analysis of Congestion, Safety and Security by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy