|
|
|||
|
||||
OverviewEmerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things, blockchain, encryption, and quantum cryptography are required to meet multimedia data's evolving needs and security requirements. In digital imaging, a pixel is the smallest element of an image that can be manipulated through software. Pixels within a digital image or graphical user interface must be secured to control unauthorized access or manipulation. In this edited book, the contributors investigate the design and implementation of effective security solutions and their integration in multimedia applications to ensure authenticity and integrity in the digital age. Coverage includes how to secure pixels within a digital image or graphical user interface to control unauthorized access or manipulation. Fortressing Pixels: Information security for images, videos, audio and beyond is intended to equip readers with the knowledge and mechanisms required to safeguard assets and protect their innovative creations, business interests, and private sensitive data. Academic researchers and engineers, will find a useful resource in this book, as will industry technology professionals working in cybersecurity, forensics, computing, networking, image processing and multimedia data science. Full Product DetailsAuthor: Subhrajyoti Deb (Assistant Professor, Indian Institute of Information Technology Bhopal (IIIT Bhopal), Department of Information Technology, India) , Adnan Abdul-Aziz Gutub (Full Professor, Umm Al-Qura University (UQU), Cybersecurity Department, College of Computing, Makkah, Saudi Arabia) , Aditya Kumar Sahu (SRM University-AP, Department of Computer Science and Engineering, Andhra Pradesh 522502, India)Publisher: Institution of Engineering and Technology Imprint: Institution of Engineering and Technology ISBN: 9781837241637ISBN 10: 1837241635 Pages: 317 Publication Date: 31 January 2026 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsReviewsAuthor InformationSubhrajyoti Deb is an academic and researcher in cryptography, multimedia security, and IoT, currently serving as an assistant professor at IIIT Bhopal. He earned his PhD from NEHU Shillong and completed postdoctoral work at ISI Kolkata. A Visvesvaraya PhD Fellow, he has published 20 SCI-indexed papers, authored two books, and holds two patents. His research emphasizes lightweight encryption and secure systems. He has collaborated internationally, mentored many scholars, and actively reviews for top-tier journals. Adnan Abdul-Aziz Gutub is a full professor in the Computer Engineering Department at the College of Computers and Information Systems, Umm Al-Qura University (UQU), Makkah, Saudi Arabia. where he specializes in information and computer security. His main research interests involve optimizing, modeling, simulating, and synthesizing of VLSI hardware for crypto and security computer arithmetic operations. He is working on designing efficient integrated circuits for the Montgomery inverse computation in different finite fields. Aditya Kumar Sahu is associated with the Department of Computer Science and Engineering, SRM University-AP, India. He is working in the research areas of multimedia forensics, digital image watermarking, image tamper detection and localization, image steganography, reversible data hiding, and convolution neural-network-based data hiding. He has authored 50+ publications. He is an associate editor or editorial board member for various journals in his field. Tab Content 6Author Website:Countries AvailableAll regions |
||||