Abstract: |
During the last decade, several remarkable methodologies have been developed
to improve the levels of multimedia security. Recently, chaotic maps were considered a promising tool and have been successfully utilized in digital watermarking, data encryption, steganography, and data hiding techniques. The interest
in using different kinds of chaotic maps and systems in multimedia security has
been steadily increasing through the last few years where the number of published
papers in archived journals and conference’ proceedings was monotonically
increased. However, according to the best knowledge of the editor, no books
covering multimedia security using chaotic maps have been published, which
motivates the idea of this edited book under the title Multimedia Security Using
Chaotic Maps: Principles and Methodologies.
The book provides the readers with a comprehensive overview of principles,
methodologies, and recent advances in multimedia security using different chaotic
maps through a collection of high-quality chapters. This edited book contains 10
chapters. These chapters present original and previously unpublished work of
well-known researches from several countries dealing with different issues of
multimedia security using chaotic maps. Each chapter includes an introduction that
reviews up-to-date techniques, presents outcomes, and points out challenges and
future directions. In this book, illustrative figures, tables, and examples are used to
improve the presentation and the analysis of the covered security problem. Also,
each chapter includes a list of references for further exploration of the considered
security problem. The book is a valuable reference for researchers, engineers, IT
specialists, developers, postgraduate students, and senior undergraduate students
with majors in data security
|
|
|