دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Aditya Kumar Sahu (editor)
سری:
ISBN (شابک) : 9819998026, 9789819998029
ناشر: Springer
سال نشر: 2024
تعداد صفحات: 143
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 4 مگابایت
در صورت تبدیل فایل کتاب Multimedia Watermarking: Latest Developments and Trends به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب واترمارک چند رسانه ای: آخرین تحولات و روندها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Acknowledgments Contents Chapter 1: Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA 1.1 Introduction 1.2 Related Works 1.3 Method 1.3.1 Data Sources and Search Approaches 1.3.2 Inclusion and Exclusion Indicators 1.3.3 Process Exploration and Research Selection 1.3.4 Data Gathering Procedure 1.4 Result 1.4.1 What Are the Applications of Watermarking Techniques? 1.4.1.1 Content Verification 1.4.1.2 Concealment Fortification 1.4.1.3 Proprietorship Proclamation and Identification 1.4.1.4 Transmission Monitoring 1.4.1.5 Transaction Tracking 1.4.1.6 Fingerprinting 1.4.2 What Are the Attributes of Watermarking? 1.4.2.1 Fidelity 1.4.2.2 Robustness 1.4.2.3 Dependability 1.4.2.4 Integrity 1.4.2.5 Capacity 1.4.2.6 Secrecy 1.4.2.7 Efficiency 1.4.2.8 Generality 1.4.3 What Are the NN Algorithms That Have Been Used in the Domain of Watermarking? 1.4.4 What Are the Various Challenges and Future Directions of Embedding Watermarks in NNs? 1.5 Conclusion References Chapter 2: Digital Watermarking: Pathway to Secure! 2.1 Introduction 2.1.1 History 2.1.2 Requirements for the Effectiveness of Watermarking 2.1.2.1 Characteristics of Watermarking 2.2 What Is Digital Watermarking 2.2.1 Digital Watermarking Scheme 2.2.2 Principles of Digital Watermarking 2.2.3 Classification of Digital Watermarking 2.2.3.1 Multimedia Based 2.2.3.2 Characteristic Based Blind and Non-Blind Visible and Invisible Robust, Fragile, and Semi-Fragile Spatial and Frequency Domain 2.2.3.3 Application Based 2.2.4 Techniques of Digital Watermarking 2.2.4.1 Discrete Cosine Transform (DCT) 2.2.4.2 Discrete Wavelet Transform (DWT) 2.2.4.3 Grasshopper Optimization Algorithm (GOA) 2.3 Applications of Digital Watermarking 2.3.1 Copyright Protection 2.3.2 Military 2.3.3 Temper Detection 2.3.4 Image Authentication 2.3.5 Broadcast Monitoring 2.3.6 Remote Education 2.3.7 Digital Forensic 2.3.8 Smart Healthcare 2.3.9 Finger Printing 2.3.10 Copy Control 2.3.11 Electronic Voting 2.4 Process of Digital Watermarking 2.5 Attacks on Watermarking 2.6 Conclusion References Chapter 3: Secured Digital Watermarking Using Neural Networks 3.1 Introduction 3.2 Background 3.3 Taxonomy of Neural Network Watermarking 3.3.1 Embedding Method 3.3.2 Evaluation of Accessibility 3.3.3 Capacity 3.3.4 Authentication 3.3.5 Uniqueness 3.4 Categories of Watermarking Method 3.4.1 The Integration of Watermarks into Model Parameters 3.4.2 Triggering Pre-Defined Inputs 3.4.2.1 Robust Watermarking 3.4.3 Unique Watermarking 3.4.4 Model Fingerprint Analysis for the Identification of Possibly Theft Items 3.5 Watermarking Techniques Using Neural Network 3.6 Result and Analysis 3.7 Conclusion References Chapter 4: The Impact of Denoising in Watermarking Robustness 4.1 Introduction 4.2 Requisite of a Good Watermarking System 4.3 Categorization of Denoising 4.3.1 Linear Filter 4.3.2 Non-linear Filter 4.3.3 Non-adaptive Filter 4.4 Denoising Attacks Based on Deep Learning 4.5 Impact of Denoising on Watermarking in Information Retrieval 4.6 Impact of Denoising in Improving the Watermarking Robustness 4.7 Conclusion References Chapter 5: A Watermark Challenge: Synthetic Speech Detection 5.1 Introduction 5.2 Proposed Synthetic Speech Detection Model 5.2.1 Statistical Features 5.2.2 Approximate Entropy 5.2.3 Sample Entropy 5.2.4 Permutation Entropy 5.2.5 Dispersion Entropy 5.2.6 Fuzzy Entropy 5.3 Experimentation and Results 5.3.1 Synthetic Audio Database 5.3.2 Results and Discussion 5.4 Conclusion References Chapter 6: Role of Blockchain and Watermarking Toward Cybersecurity 6.1 Introduction 6.1.1 A New Protection Logo: A Digital Watermark 6.2 How Blockchain Works? 6.2.1 Way to Transfer the Amount 6.2.2 Why Is Blockchain Important? 6.3 How Do Different Industries Use Blockchain? 6.3.1 Energy 6.3.2 Finance 6.3.3 Medical 6.3.4 Media and Entertainment 6.4 Blockchain Security 6.4.1 How Security Differs by Blockchain Types 6.4.2 The Major Private and Public Blockchains 6.4.3 How Does a Public Blockchain Work 6.5 Cyberattacks and Fraud 6.5.1 How Fraudsters Attack Blockchain Technology 6.5.2 Blockchain Security for the Enterprise 6.6 What Are the Disadvantages of Blockchains? 6.7 Watermarking 6.8 Digital Watermarking: Protecting Civilians in Cyberwarfare 6.8.1 Military Cyber Operations and the Potential Human Cost 6.8.2 Implementation of a Digital Watermark System 6.8.3 Different Types of Watermarks 6.8.4 Advantages of Digital Watermarking 6.9 Combination of Blockchain and Watermarking 6.10 Enhancing Cybersecurity Through Blockchain and Watermarking 6.11 Conclusion References Chapter 7: Contemporary Improvements in Enhancing the Watermarking Techniques: A Deep Perspective 7.1 Introduction 7.2 Properties of a Good Watermark Technique 7.3 Applications of Digital Watermarking 7.4 Classification of Digital Image Watermarking 7.4.1 Spatial Image Watermarking 7.4.2 Frequency Image Watermarking 7.4.3 Watermarking Using Discrete Cosine Transform (DCT) 7.4.4 Watermarking Using Discrete Fourier Transform (DFT) 7.4.5 Watermarking Using Discrete Wavelet Transform (DFT) 7.4.6 Hybrid Digital Image Watermarking 7.4.7 Limitations of Hybrid Image Watermarking 7.5 Attacks on Watermarking Images 7.6 Conclusion and Future Directions References