Mohit Dua - Böcker
Visar alla böcker från författaren Mohit Dua. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
1 652 kr
Kommande
With the quick advancement of web technology and network applications, protecting digitized information from unwanted access and modification has become a critical problem in today’s digital world. The security issue in electronic media has presented a complex challenge, initiating the development of cryptographic algorithms incorporating Chaos theory and secret sharing schemes. Chaos theory and Secret Sharing have been used to develop various multimedia application encryption strategies. Encryption converts multimedia data, i.e., images, audio, and videos, into noise-like data. The chaotic map characteristics, such as nonlinearity and sensitivity to the initial conditions, make it suitable for use in cryptography. At the same time, secret schemes can protect essential information against loss, modification, or destruction. Numerous techniques based on Chaos theory and Secret Sharing have been created to overcome these issues. These security techniques have become very popular for developing image and video cryptosystems. Also, the authors have developed chaotic map based cryptosystems for other forms of multimedia data and other research fields such as IoT, Cloud computing, smart grid, etc. Moreover, the authors have proposed different secret-sharing schemes to recognize and secure multimedia data based on their characteristics. Furthermore, some books have been edited by the authors, concentrating only on different methodologies proposed by the researchers. However, no authored book that discusses this important research topic from the viewpoint of chaotic map based multimedia encryption is available in the market. To this end, the book aims to review and highlight the challenges of intelligent multimedia security and present the recent developments to address those challenges.
680 kr
Kommande
With the quick advancement of web technology and network applications, protecting digitized information from unwanted access and modification has become a critical problem in today’s digital world. The security issue in electronic media has presented a complex challenge, initiating the development of cryptographic algorithms incorporating Chaos theory and secret sharing schemes. Chaos theory and Secret Sharing have been used to develop various multimedia application encryption strategies. Encryption converts multimedia data, i.e., images, audio, and videos, into noise-like data. The chaotic map characteristics, such as nonlinearity and sensitivity to the initial conditions, make it suitable for use in cryptography. At the same time, secret schemes can protect essential information against loss, modification, or destruction. Numerous techniques based on Chaos theory and Secret Sharing have been created to overcome these issues. These security techniques have become very popular for developing image and video cryptosystems. Also, the authors have developed chaotic map based cryptosystems for other forms of multimedia data and other research fields such as IoT, Cloud computing, smart grid, etc. Moreover, the authors have proposed different secret-sharing schemes to recognize and secure multimedia data based on their characteristics. Furthermore, some books have been edited by the authors, concentrating only on different methodologies proposed by the researchers. However, no authored book that discusses this important research topic from the viewpoint of chaotic map based multimedia encryption is available in the market. To this end, the book aims to review and highlight the challenges of intelligent multimedia security and present the recent developments to address those challenges.
1 550 kr
Kommande
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic user's account or if it genuinely originates from the declared user. Primarily used for person authentication, these systems strive to verify the speaker's claimed identity. Despite substantial technological advancements, recent testing has revealed persistent vulnerabilities to spoofing, commonly referred to as a spoof attack. Various techniques such as mimicry, replay, text to speech (TTS), and voice conversion (VC) are frequently used in ASV systems to execute logical access (LA) or physical access (PA) spoofing attacks. To protect an ASD system from these attacks, many researchers have proposed effective security models as countermeasures. In addition, numerous review papers by different researchers have discussed various countermeasures developed to secure ASD systems. However, there is a notable absence of an authored book that comprehensively addresses this critical research topic, encompassing frontend, backend, dataset, and types of attacks considerations. Therefore, there is an urgent need for a book that can serve as a valuable resource for upcoming researchers, offering insights into securing ASD systems and bridging the existing gap in the literature. Hence, this book represents an effort by the authors in that direction.
638 kr
Kommande
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic user's account or if it genuinely originates from the declared user. Primarily used for person authentication, these systems strive to verify the speaker's claimed identity. Despite substantial technological advancements, recent testing has revealed persistent vulnerabilities to spoofing, commonly referred to as a spoof attack. Various techniques such as mimicry, replay, text to speech (TTS), and voice conversion (VC) are frequently used in ASV systems to execute logical access (LA) or physical access (PA) spoofing attacks. To protect an ASD system from these attacks, many researchers have proposed effective security models as countermeasures. In addition, numerous review papers by different researchers have discussed various countermeasures developed to secure ASD systems. However, there is a notable absence of an authored book that comprehensively addresses this critical research topic, encompassing frontend, backend, dataset, and types of attacks considerations. Therefore, there is an urgent need for a book that can serve as a valuable resource for upcoming researchers, offering insights into securing ASD systems and bridging the existing gap in the literature. Hence, this book represents an effort by the authors in that direction.
Machine Learning Techniques for Pattern Recognition and Information Security
Inbunden, Engelska, 2021
4 162 kr
Skickas inom 5-8 vardagar
Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences
PCCDS 2020
Inbunden, Engelska, 2021
2 110 kr
Skickas inom 10-15 vardagar
This book presents best selected papers presented at the International Conference on Paradigms of Computing, Communication and Data Sciences (PCCDS 2020), organized by National Institute of Technology, Kurukshetra, India, during 1–3 May 2020.
Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences
PCCDS 2020
Häftad, Engelska, 2022
2 110 kr
Skickas inom 10-15 vardagar
This book presents best selected papers presented at the International Conference on Paradigms of Computing, Communication and Data Sciences (PCCDS 2020), organized by National Institute of Technology, Kurukshetra, India, during 1–3 May 2020.
Proceedings of the International Conference on Paradigms of Communication, Computing and Data Sciences
PCCDS 2021
Inbunden, Engelska, 2021
2 110 kr
Skickas inom 10-15 vardagar
This book gathers selected high-quality research papers presented at the International Conference on Paradigms of Communication, Computing and Data Sciences (PCCDS 2021), held at the National Institute of Technology, Kurukshetra, India, during May 07–09, 2021.
Proceedings of the International Conference on Paradigms of Communication, Computing and Data Sciences
PCCDS 2021
Häftad, Engelska, 2022
2 110 kr
Skickas inom 10-15 vardagar
This book gathers selected high-quality research papers presented at the International Conference on Paradigms of Communication, Computing and Data Sciences (PCCDS 2021), held at the National Institute of Technology, Kurukshetra, India, during May 07–09, 2021.