You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The use of digital images in today’s modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Companies who wish to distribute their content over the internet face numerous security risks such as copyright violation. Advanced methods for the protection and security of digital data are constantly emerging, and up-to-date research in this area is lacking. Advancements in Security and Privacy Initiatives for Multimedia Images is a collection of innovative research on the methods and applications of contemporary techniques for the security and copyright protection of images and their distribution. While highlighting topics including simulation-based security, digital watermarking protocols, and counterfeit prevention, this book is ideally designed for security analysts, researchers, developers, programmers, academicians, practitioners, students, executives, educators, and policymakers seeking current research on modern security improvements for multimedia images.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Sixth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2022), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
Welcome to the first edition of “Multimedia Security Paradigms: A Peer-to-peer network perspective”, since the publication of our research manuscripts which have been adopted into various conventional studies and also obtained appreciation from many research communities which has overwhelmed us with positive response. This edition of the book attempts collaborating the overall research contribution and also present in the form of a book edition which has been obtained from the entire prior work carried out till date. The book basically discusses about the conventional client-server architecture and its drawbacks in various commercialized applications currently being practised in internetworking domain. Further, the book emphasizes on introducing peer-to-peer (p2p) and its design aspects which plays a vital role in transferring files with massive size.
This book includes selected papers presented at the 3rd International Conference on Data Engineering and Communication Technology (ICDECT-2K19), held at Stanley College of Engineering and Technology for Women, Hyderabad, from 15 to 16 March 2019. It features advanced, multidisciplinary research towards the design of smart computing, information systems, and electronic systems. It also focuses on various innovation paradigms in system knowledge, intelligence, and sustainability which can be applied to provide viable solutions to diverse problems related to society, the environment, and industry.
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and "platform"-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the pote...
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and priva...
The security of an organizational information system with the invention of next-generation technologies is a prime focus these days. The industries and institutions in the field of computing and communication, especially in internet of things, cloud computing, mobile networks, next-generation networks, the energy market, banking sector, government sector, and many more, are primarily focused on these security and privacy issues. Blockchain is a new technology that has changed the scenario when it comes to addressing security concerns and resolving traditional safety issues. These industries have started developing applications based on the blockchain underlying platform to tap into this unli...
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms r...
Heavily dominated by the sector of information and communication technologies, economic organizations pursue digital transformation as a differentiating factor and source of competitive advantage. Understanding the challenges of digital transformation is critical to managers to ensure business sustainability. However, there are some problems, such as architecture, security, and reliability, among others, that bring with them the need for studies and investments in this area to avoid significant financial losses. Digital transformation encompasses and challenges many areas, such as business models, organizational structures, human privacy, management, and more, creating a need to investigate ...
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disa...