Ahmad, Rabiah
Multimedia Forensics and Security
Part I. Forensic Analysis in Cloud Computing
1. Cloud Computing Forensic Analysis: Trends and Challenges
Amira Sayed A. Aziz, Mohamed Mostafa Fouad, Aboul Ella Hassanien
2. Data Storage Security Service in Cloud Computing: Challenges and Solutions
Alshaimaa Abo-alian, Nagwa L. Badr, Mohamed Fahmy Tolba
3. Homomorphic Cryptosystems for Securing Data in Public Cloud Computing
Nihel Msilini, Lamri Laouamer, Bechir Alaya, Chaffa Hamrouni
4. An Enhanced Cloud Based View Materialization Approach for Peer-to-Peer Architecture
M. E. Megahed, Rasha M. Ismail, Nagwa L. Badr, Mohamed Fahmy Tolba
5. Distributed Database System (DSS) Design Over a Cloud Environment
Ahmed E. Abdel Raouf, Nagwa L. Badr, Mohamed Fahmy Tolba
6. A New Stemming Algorithm for Efficient Information Retrieval Systems and Web Search Engines
Safaa I. Hajeer, Rasha M. Ismail, Nagwa L. Badr, Mohamed Fahmy Tolba
Part II. Forensics Multimedia and Watermarking Techniques
7. Face Recognition via Taxonomy of Illumination Normalization
Sasan Karamizadeh, Shahidan M. Abdullah, Mazdak Zamani, Jafar Shayan, Parham Nooralishahi
8. Detecting Significant Changes in Image Sequences
Sergii Mashtalir, Olena Mikhnova
9. VW16E: A Robust Video Watermarking Technique Using Simulated Blocks
Farnaz Arab, Mazdak Zamani
10. A Robust and Computationally Efficient Digital Watermarking Technique Using Inter Block Pixel Differencing
Shabir A. Parah, Javaid A. Sheikh, Nazir A. Loan, G. M. Bhat
11. JPEG2000 Compatible Layered Block Cipher
Qurban A. Memon
Part III. Digital Forensic Applications
12. Data Streams Processing Techniques
Fatma Mohamed, Rasha M. Ismail, Nagwa L. Badr, Mohamed Fahmy Tolba
13. Evidence Evaluation of Gait Biometrics for Forensic Investigation
Imed Bouchrika
14. Formal Acceptability of Digital Evidence
Jasmin Cosic
15. A Comprehensive Android Evidence Acquisition Framework
Amir Sadeghian, Mazdak Zamani
16. A New Hybrid Cryptosystem for Internet of Things Applications
Ashraf Darwish, Maged M. El-Gendy, Aboul Ella Hassanien
17. A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack
Yashar Javadianasl, Azizah Abd Manaf, Mazdak Zamani
Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics), Forensic Medicine, Systems and Data Security, Security Science and Technology
- Editor
- Ahmad, Rabiah
- Fouad, Mohamed Mostafa
- Hassanien, Aboul Ella
- Kacprzyk, Janusz
- Manaf, Azizah Abdul
- Zamani, Mazdak
- Publisher
- Springer
- Publication year
- 2017
- Language
- en
- Edition
- 1
- Series
- Intelligent Systems Reference Library
- Page amount
- 11 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783319442709
- Printed ISBN
- 978-3-319-44268-6