Intelligent Multimedia Analysis for Security Applications

It is our sincere hope that this publication and its great amount of information and research will assist our research colleagues, faculty members and students, and organization decision makers in enhancing their understanding for the concepts, issues, problems, trends, challenges and opportunities...

Full description

Bibliographic Details
Other Authors: Sencar, Husrev T. (Editor), Velastin, Sergio (Editor), Nikolaidis, Nikolaos (Editor), Lian, Shiguo (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Studies in Computational Intelligence
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04407nmm a2200397 u 4500
001 EB000384008
003 EBX01000000000000000237060
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642117565 
100 1 |a Sencar, Husrev T.  |e [editor] 
245 0 0 |a Intelligent Multimedia Analysis for Security Applications  |h Elektronische Ressource  |c edited by Husrev T. Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian 
250 |a 1st ed. 2010 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010, 2010 
300 |a X, 404 p. 153 illus  |b online resource 
505 0 |a Moving Pixels in Static Cameras: Detecting Dangerous Situations due to Environment or People -- Recognizing Interactions in Video -- Robust Audio Visual Biometric Person Authentication with Liveness Verification -- Multiple Traits for People Identification -- Intelligent Multimedia Analysis for Emerging Biometrics -- Overview of Audio Forensics -- Printer and Scanner Forensics: Models and Methods -- Privacy Enhancing Solutions for Personal Information Based Multimedia Content Sharing -- Image-Based Sensitive Information Filtering for Teleradiology -- Detecting Nakedness in Color Images -- An Introduction to the Principles and Requirements of Robust Hashing -- Content-Based Video Copy Detection – A Survey -- Image Steganalysis -- WBE-Based Anti-collusion Fingerprints: Design and Detection -- An Introduction to Robust Transform Based Image Watermarking Techniques -- Watermark-Based Authentication 
653 |a Engineering mathematics 
653 |a Multimedia systems 
653 |a Artificial Intelligence 
653 |a Artificial intelligence 
653 |a Engineering / Data processing 
653 |a Multimedia Information Systems 
653 |a Mathematical and Computational Engineering Applications 
700 1 |a Velastin, Sergio  |e [editor] 
700 1 |a Nikolaidis, Nikolaos  |e [editor] 
700 1 |a Lian, Shiguo  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Studies in Computational Intelligence 
028 5 0 |a 10.1007/978-3-642-11756-5 
856 4 0 |u https://doi.org/10.1007/978-3-642-11756-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 620 
520 |a It is our sincere hope that this publication and its great amount of information and research will assist our research colleagues, faculty members and students, and organization decision makers in enhancing their understanding for the concepts, issues, problems, trends, challenges and opportunities related to this research field. Perhaps this book will even inspire its readers to contribute to the current discoveries in this immense field 
520 |a Topics covered include dangerous or abnormal event detection, interaction recognition, person identification based on multiple traits, audiovisual biometric person authentication and liveness verification, emerging biometric technologies, sensitive information filtering for teleradiology, detection of nakedness in images, audio forensics, steganalysis, media content tracking authentication and illegal distributor identification through watermarking and content-based copy detection. We believe that the comprehensive coverage of diverse disciplines in the field of intelligent multimedia analysis for security applications will contribute to a better understanding of all topics, research, and discoveries in this emerging and evolving field and that the included contributions will be instrumental in the expansion of the corresponding body of knowledge, making this book a reference source of information.  
520 |a This is one of the very few books focused on analysis of multimedia data and newly emerging multimedia applications with an emphasis on security. The main objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most comprehensive list of research references. The book includes sixteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues.