Handbook of Research on Multimedia Cyber Security

Handbook of Research on Multimedia Cyber Security

Release Date: April, 2020|Copyright: © 2020 |Pages: 372
DOI: 10.4018/978-1-7998-2701-6
ISBN13: 9781799827016|ISBN10: 1799827011|EISBN13: 9781799827023
Hardcover:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$1,500.00
TOTAL SAVINGS: $1,500.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data.

The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Biometrics
  • Chaotic Systems
  • Cryptographic Protocols
  • Encryption
  • Feature Extraction
  • Information Retrieval
  • Intelligent Security Techniques
  • Multimedia Forensics
  • Smart Cities
  • Soft Computing
  • Watermarking
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
B. B. Gupta received his PhD degree from the Indian Institute of Technology Roorkee, India in the area of information security. He has published more than 50 research papers in international journals and conferences of high repute. He has visited several countries to present his research work. His biography has published in the Marquis Who’s Who in the World, 2012. At present, he is working as an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra, India. His research interest includes information security, cyber security, cloud computing, web security, intrusion detection, computer networks and phishing.

Deepak Gupta received his Master of Science degree from Illinois Institute of Technology, Chicago, USA, in the area of Computer Forensics and Cyber Security with a specialization in Voice Over Internet Protocol (VOIP). As an undergraduate student, he became certified on the major networking platforms, first as a CCNA (Cisco Certified Network Administrator) and then as a MCP (Microsoft Certified Professional) which would come to serve him well in his professional life. As a graduate student, Deepak continued to challenge himself by working on a number of research papers and projects related to Computer Network Security and Forensics Research, including the topics of multi-boot computer systems with change of boot loader and MP3 steganography. He also developed and furthered his interest in VOIP technology by working on and leading research projects with Bell Labs, a prominent VOIP research lab based in Chicago. Deepak also wrote research papers in this field on the topics of P2P communication and SIP protocols which won him the best student VOIP project award in 2007. Over the last 10 years of professional experience, Deepak has gained a broad range of experience in computer security and technology that spans multiple fields and industries. After graduating with distinction with a MS in Computer Science, Deepak went on to work for Sageworks, a financial software company based in Raleigh, NC. There, among other things, he developed a centralized integration process for core banking platforms that would allow customers to easily port and map their data to the central banking database. Deepak is a product visionary who founded a web agency and two other startups as a software entrepreneur to help businesses to simplify their user communication. It was during this time that Deepak's passion for innovation and entrepreneurship led him to found LoginRadius, a cloud identity and access management (cIAM) SaaS platform that helps businesses improve and optimize their customer experience by creating unified digital identities across multiple touch points, where he remains today as co-founder and CTO. At LoginRadius, Deepak makes use of his expertise in security and forensics to innovate and improve how identity services are delivered and secured in the cloud identity space and helps businesses deliver social media integrations by a simplified REST API. Currently, LoginRadius is a leading provider of cloud-based CIAM solutions for mid-to-large sized companies, and the platform serves over 3,000 businesses with a monthly reach of 850 million users worldwide. The company has been named as an industry leader in the cIAM space by Gartner, Forrester, Kuppingercole, and Computer Weekly. Deepak is also passionate about helping businesses improve and optimize their customer experience. He lives and breathes this topic with customers everyday by helping them think through questions such as how do users interact with their website, how to simplify the customer's experience (via single sign-on, one touch login, etc.), and how to keep the customer's data secure. Deepak is active member of IEEE, ACM, OpenID Foundation, Cloud Security Alliance (CSA), etc. tech communities. Deepak is doing his current research in Machine Learning, Artificial Intelligence and Blockchain Technologies. Web: www.loginradius.com

Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.