Multimedia Security Using Chaotic Maps: Principles and Methodologies

Faculty Computer Science Year: 2020
Type of Publication: ZU Hosted Pages:
Authors:
Journal: 884 ٍSpringer Volume:
Keywords : Multimedia Security Using Chaotic Maps: Principles    
Abstract:
During the last decade, several remarkable methodologies have been developed to improve the levels of multimedia security. Recently, chaotic maps were considered a promising tool and have been successfully utilized in digital watermarking, data encryption, steganography, and data hiding techniques. The interest in using different kinds of chaotic maps and systems in multimedia security has been steadily increasing through the last few years where the number of published papers in archived journals and conference’ proceedings was monotonically increased. However, according to the best knowledge of the editor, no books covering multimedia security using chaotic maps have been published, which motivates the idea of this edited book under the title Multimedia Security Using Chaotic Maps: Principles and Methodologies. The book provides the readers with a comprehensive overview of principles, methodologies, and recent advances in multimedia security using different chaotic maps through a collection of high-quality chapters. This edited book contains 10 chapters. These chapters present original and previously unpublished work of well-known researches from several countries dealing with different issues of multimedia security using chaotic maps. Each chapter includes an introduction that reviews up-to-date techniques, presents outcomes, and points out challenges and future directions. In this book, illustrative figures, tables, and examples are used to improve the presentation and the analysis of the covered security problem. Also, each chapter includes a list of references for further exploration of the considered security problem. The book is a valuable reference for researchers, engineers, IT specialists, developers, postgraduate students, and senior undergraduate students with majors in data security
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet