Buch, Englisch, 224 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
Buch, Englisch, 224 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
ISBN: 978-1-032-80244-2
Verlag: Taylor & Francis Ltd
With the quick advancement of web technology and network applications, protecting digitized information from unwanted access and modification has become a critical problem in today’s digital world. The security issue in electronic media has presented a complex challenge, initiating the development of cryptographic algorithms incorporating Chaos theory and secret sharing schemes. Chaos theory and Secret Sharing have been used to develop various multimedia application encryption strategies. Encryption converts multimedia data, i.e., images, audio, and videos, into noise-like data. The chaotic map characteristics, such as nonlinearity and sensitivity to the initial conditions, make it suitable for use in cryptography. At the same time, secret schemes can protect essential information against loss, modification, or destruction. Numerous techniques based on Chaos theory and Secret Sharing have been created to overcome these issues. These security techniques have become very popular for developing image and video cryptosystems. Also, the authors have developed chaotic map based cryptosystems for other forms of multimedia data and other research fields such as IoT, Cloud computing, smart grid, etc. Moreover, the authors have proposed different secret-sharing schemes to recognize and secure multimedia data based on their characteristics. Furthermore, some books have been edited by the authors, concentrating only on different methodologies proposed by the researchers. However, no authored book that discusses this important research topic from the viewpoint of chaotic map based multimedia encryption is available in the market. To this end, the book aims to review and highlight the challenges of intelligent multimedia security and present the recent developments to address those challenges.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung Multimedia
Weitere Infos & Material
Chapter 1: Introduction. 1.1 Background. 1.2 Definition. 1.3 History. 1.4 Classification. 1.5 Book Organization. Chapter 2: Chaos Theory. 2.1 Overview of Chaos Theory. 2.2 Properties and Applications of Chaos. 2.3 Chaos & Cryptography. 2.4 Application of Chaos Theory in Cryptography. 2.5 Chaos Map & Types. 2.6 Chaos System Analysis. 2.7 Conclusion. Chapter 3: Secret Sharing Schemes. 3.1 Introduction to Secret Sharing Scheme. 3.2 Challenges of Secret Sharing Scheme. 3.3 Mathematics background of Secret Schemes. 3.4 Types of Secret Scheme. 3.5 Characteristics of Secret Sharing Schemes. Chapter 4: Text Encryption. 4.1 Introduction to Text Encryption. 4.2 Traditional Cryptographic based Text Encryption Methods. 4.3 Secret Sharing Scheme based Text Encryption Algorithms. 4.4 Chaotic maps-based Text Encryption Algorithms. Chapter 5: Image Encryption. 5.1 Introduction. 5.2 Need of Image encryption. 5.3 Image Encryption using Chaos Theory. 5.4 Secret Sharing Schemes based Encryption of an Image. 5.5 Performance analysis. Chapter 6: Audio Encryption Strategy. 6.1 Introduction to the Audio and its encryption. 6.2 Need for Audio Encryption. 6.3 Role of Audio encryption in digital era. 6.4 Audio encryption using Chaos Theory. 6.5 Audio Encryption Performance Metrics. 6.6 Audio Decryption Performance Metrics. 6.7 Applications of Audio Encryption. Chapter 7: Video Encryption Strategy. 7.1 Introduction to Video and Video Summarization. 7.2 Video Encryption using Chaos Theory. 7.3 Use secret sharing schemes to protect video. 7.4 Evaluation of the video encryption methods' performance. 7.5 Applications of Video summarization and Security. Chapter 8: Recent Trends, Challenges and Open Issues. 8.1 Recent Trends in audio, Video, and Image Security. 8.2 Open Issues and Challenges. Chapter 9: Implementation and adoptability of the multimedia Encryption Strategies using python. 9.1 Platforms Supporting Implementation. 9.2 Python Libraries for Chaotic Map-Based Encryption. 9.3 Installation of Libraries. 9.4 Python Implementation code.




