|
|
|
|
LEADER |
03222nam a22005775i 4500 |
001 |
978-3-319-44270-9 |
003 |
DE-He213 |
005 |
20180108141001.0 |
007 |
cr nn 008mamaa |
008 |
161017s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319442709
|9 978-3-319-44270-9
|
024 |
7 |
|
|a 10.1007/978-3-319-44270-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Multimedia Forensics and Security
|h [electronic resource] :
|b Foundations, Innovations, and Applications /
|c edited by Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, Janusz Kacprzyk.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XI, 414 p. 166 illus., 98 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Intelligent Systems Reference Library,
|x 1868-4394 ;
|v 115
|
520 |
|
|
|a This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Forensic medicine.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a Forensic Medicine.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Hassanien, Aboul Ella.
|e editor.
|
700 |
1 |
|
|a Mostafa Fouad, Mohamed.
|e editor.
|
700 |
1 |
|
|a Manaf, Azizah Abdul.
|e editor.
|
700 |
1 |
|
|a Zamani, Mazdak.
|e editor.
|
700 |
1 |
|
|a Ahmad, Rabiah.
|e editor.
|
700 |
1 |
|
|a Kacprzyk, Janusz.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319442686
|
830 |
|
0 |
|a Intelligent Systems Reference Library,
|x 1868-4394 ;
|v 115
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-44270-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|