Search dblp for Publications

export results for "toc:db/books/collections/SM2019.bht:"

 download as .bib file

@incollection{DBLP:books/sp/19/0001RSYF19,
  author       = {Muhammad Sharif and
                  Mudassar Raza and
                  Jamal Hussain Shah and
                  Mussarat Yasmin and
                  Steven Lawrence Fernandes},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {An Overview of Biometrics Methods},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_2},
  doi          = {10.1007/978-3-030-15887-3\_2},
  timestamp    = {Wed, 14 Apr 2021 09:01:34 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/0001RSYF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/AfzalJMARM19,
  author       = {Sitara Afzal and
                  Mubashir Javed and
                  Muazzam Maqsood and
                  Farhan Aadil and
                  Seungmin Rho and
                  Irfan Mehmood},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {A Segmentation-Less Efficient Alzheimer Detection Approach Using Hybrid
                  Image Features},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {421--429},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_20},
  doi          = {10.1007/978-3-030-15887-3\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/AfzalJMARM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Boveiri19,
  author       = {Hamid Reza Boveiri},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Supercomputing with an Efficient Task Scheduler as an Infrastructure
                  for Big Multimedia Processing},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {723--752},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_35},
  doi          = {10.1007/978-3-030-15887-3\_35},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/19/Boveiri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/DiwakarK19,
  author       = {Manoj Diwakar and
                  Pardeep Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {3-D Shape Reconstruction Based {CT} Image Enhancement},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {413--419},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_19},
  doi          = {10.1007/978-3-030-15887-3\_19},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/DiwakarK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/DiwakarK19a,
  author       = {Manoj Diwakar and
                  Pardeep Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Wavelet Packet Based {CT} Image Denoising Using Bilateral Method and
                  Bayes Shrinkage Rule},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {501--511},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_24},
  doi          = {10.1007/978-3-030-15887-3\_24},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/DiwakarK19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/GopalakrishnanR19,
  author       = {T. Gopalakrishnan and
                  S. Ramakrishnan},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Performance Analysis of Image Encryption Methods Using Chaotic, Multiple
                  Chaotic and Hyper-Chaotic Maps},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {233--265},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_10},
  doi          = {10.1007/978-3-030-15887-3\_10},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/GopalakrishnanR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/HosnyD19,
  author       = {Khalid M. Hosny and
                  Mohamed M. Darwish},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Performance Analysis of Invariant Quaternion Moments in Color Image
                  Watermarking},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {167--208},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_8},
  doi          = {10.1007/978-3-030-15887-3\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/HosnyD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/HurrahPS19,
  author       = {Nasir N. Hurrah and
                  Shabir A. Parah and
                  Javaid A. Sheikh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {A Secure Medical Image Watermarking Technique for E-Healthcare Applications},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {119--141},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_6},
  doi          = {10.1007/978-3-030-15887-3\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/HurrahPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/IqbalMSP19,
  author       = {Nadeem Iqbal and
                  Malik Muhammad Saad Missen and
                  Nadeem Salamat and
                  V. B. Surya Prasath},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {On Video Based Human Abnormal Activity Detection with Histogram of
                  Oriented Gradients},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_21},
  doi          = {10.1007/978-3-030-15887-3\_21},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/IqbalMSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/JanakiramanTRPA19,
  author       = {Siva Janakiraman and
                  Karuppusamy Thenmozhi and
                  John Bosco Balaguru Rayappan and
                  V. Moorthi Paramasivam and
                  Rengarajan Amirtharajan},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Realization of Chaos-Based Private Multiprocessor Network Via {USART}
                  of Embedded Devices},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {323--340},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_14},
  doi          = {10.1007/978-3-030-15887-3\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/JanakiramanTRPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/JaswalNN19,
  author       = {Gaurav Jaswal and
                  Aditya Nigam and
                  Ravinder Nath},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Finger Biometrics for e-Health Security},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {577--617},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_28},
  doi          = {10.1007/978-3-030-15887-3\_28},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/JaswalNN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/JindalS19,
  author       = {Neeru Jindal and
                  Kulbir Singh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Digital Image Forensics-Gateway to Authenticity: Crafted with Observations,
                  Trends and Forecasts},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {681--701},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_33},
  doi          = {10.1007/978-3-030-15887-3\_33},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/JindalS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Kasana19,
  author       = {Geeta Kasana},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Hybrid Transforms Based Oblivious Fragile Watermarking Techniques},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {143--166},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_7},
  doi          = {10.1007/978-3-030-15887-3\_7},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/Kasana19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/KoMP19,
  author       = {Hoon Ko and
                  Libor Mesicek and
                  Sung Bum Pan},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {{ECG} Security Challenges: Case Study on Change of {ECG} According
                  to Time for User Identification},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {619--628},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_29},
  doi          = {10.1007/978-3-030-15887-3\_29},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/KoMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/KumarB19,
  author       = {Sanoj Kumar and
                  Gaurav Bhatnagar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {{SIE:} An Application to Secure Stereo Images Using Encryption},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {37--61},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_3},
  doi          = {10.1007/978-3-030-15887-3\_3},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/KumarB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/KumarPK19,
  author       = {Shailesh Kumar and
                  Shashwat Pathak and
                  Basant Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Automated Detection of Eye Related Diseases Using Digital Image Processing},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {513--544},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_25},
  doi          = {10.1007/978-3-030-15887-3\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/KumarPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/MaselenoOD0I19,
  author       = {Andino Maseleno and
                  Marini Othman and
                  P. Deepalakshmi and
                  K. Shankar and
                  M. Ilayaraja},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Hash Function Based Optimal Block Chain Model for the Internet of
                  Things (IoT)},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_12},
  doi          = {10.1007/978-3-030-15887-3\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/MaselenoOD0I19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/MehrajKOAJ19,
  author       = {Tehseen Mehraj and
                  Burhan Ul Islam Khan and
                  Rashidah Funke Olanrewaju and
                  Farhat Anwar and
                  Ahmad Zamani Bin Jusoh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {An Adaptive and Viable Face Identification for Android Mobile Devices},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {301--322},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_13},
  doi          = {10.1007/978-3-030-15887-3\_13},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/MehrajKOAJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/NeelimaS19,
  author       = {Arambam Neelima and
                  Kh. Manglem Singh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Perceptual Hash Function for Images Based on Hierarchical Ordinal
                  Pattern},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {267--287},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_11},
  doi          = {10.1007/978-3-030-15887-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/NeelimaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/PreethiL19,
  author       = {D. Preethi and
                  D. Loganathan},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Quantization Table Selection Using Firefly with Teaching and Learning
                  Based Optimization Algorithm for Image Compression},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {473--499},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_23},
  doi          = {10.1007/978-3-030-15887-3\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/PreethiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/RajputR19,
  author       = {Amitesh Singh Rajput and
                  Balasubramanian Raman},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Example Based Privacy-Preserving Video Color Grading},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {63--87},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_4},
  doi          = {10.1007/978-3-030-15887-3\_4},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/RajputR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Ranjani19,
  author       = {J. Jennifer Ranjani},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Quantum Image Processing and Its Applications},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {395--411},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_18},
  doi          = {10.1007/978-3-030-15887-3\_18},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/19/Ranjani19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/RashidHP19,
  author       = {Mamoon Rashid and
                  Aamir Hamid and
                  Shabir A. Parah},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Analysis of Streaming Data Using Big Data and Hybrid Machine Learning
                  Approach},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {629--643},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_30},
  doi          = {10.1007/978-3-030-15887-3\_30},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/RashidHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SahuSKSK19,
  author       = {Sima Sahu and
                  Harsh Vikram Singh and
                  Basant Kumar and
                  Amit Kumar Singh and
                  Prabhat Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Image Processing Based Automated Glaucoma Detection Techniques and
                  Role of De-Noising: {A} Technical Survey},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {359--375},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_16},
  doi          = {10.1007/978-3-030-15887-3\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SahuSKSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SahuSKSK19a,
  author       = {Sima Sahu and
                  Harsh Vikram Singh and
                  Basant Kumar and
                  Amit Kumar Singh and
                  Prabhat Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Enhancement and De-Noising of {OCT} Image by Adaptive Wavelet Thresholding
                  Method},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {449--471},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_22},
  doi          = {10.1007/978-3-030-15887-3\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SahuSKSK19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SaitU0K19,
  author       = {Abdul Rahaman Wahab Sait and
                  J. Uthayakumar and
                  K. Shankar and
                  K. Sathesh Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Introduction to Multimedia Tools and Applications},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_1},
  doi          = {10.1007/978-3-030-15887-3\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SaitU0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SaroshPS19,
  author       = {Parsa Sarosh and
                  Shabir A. Parah and
                  Rimsha Sarosh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Role of Multimedia in Medicine: Study of Visual Prosthesis},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {559--576},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_27},
  doi          = {10.1007/978-3-030-15887-3\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SaroshPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SheikhuPB19,
  author       = {Javaid A. Sheikh and
                  Mehboob ul{-}Amin and
                  Shabir A. Parah and
                  Ghulam Mohiuddin Bhat},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Resource Allocation in Co-Operative Relay Networks for {IOT} Driven
                  Broadband Multimedia Services},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {703--721},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_34},
  doi          = {10.1007/978-3-030-15887-3\_34},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SheikhuPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Singh19,
  author       = {Ghanshyam Singh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {IoT for Healthcare: System Architectures, Predictive Analytics and
                  Future Challenges},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {753--773},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_36},
  doi          = {10.1007/978-3-030-15887-3\_36},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/Singh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Singh19a,
  author       = {Ghanshyam Singh},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Internet-of-Things with Blockchain Technology: State-of-the Art and
                  Potential Challenges},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {775--795},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_37},
  doi          = {10.1007/978-3-030-15887-3\_37},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/Singh19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SinghB19,
  author       = {Satendra Pal Singh and
                  Gaurav Bhatnagar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {A Novel Watermarking Technique for Multimedia Security},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {89--118},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_5},
  doi          = {10.1007/978-3-030-15887-3\_5},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SinghB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SinghN19,
  author       = {Rajiv Singh and
                  Swati Nigam},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Deep Neural Networks for Human Behavior Understanding},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {667--679},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_32},
  doi          = {10.1007/978-3-030-15887-3\_32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SinghN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SinghP19,
  author       = {Harsh Vikram Singh and
                  Purnima Pal},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Robust and Secure Hiding Scheme for Open Channel Transmission of Digital
                  Images},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_15},
  doi          = {10.1007/978-3-030-15887-3\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SinghP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/SinghV19,
  author       = {Harsh Vikram Singh and
                  Sarvesh Kumar Verma},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Detector and Descriptor Based Recognition and Counting of Objects
                  in Real Time Environment},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {545--556},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_26},
  doi          = {10.1007/978-3-030-15887-3\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SinghV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/ThankiBT19,
  author       = {Rohit M. Thanki and
                  Surekha Borra and
                  Deven Trivedi},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Security of Biometric and Biomedical Images Using Sparse Domain Based
                  Watermarking Technique},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {209--232},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_9},
  doi          = {10.1007/978-3-030-15887-3\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/ThankiBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/TiwariKA19,
  author       = {Shailendra Tiwari and
                  Kavkirat Kaur and
                  K. V. Arya},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {A Study on Dictionary Learning Based Image Reconstruction Techniques
                  for Big Medical Data},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {377--393},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_17},
  doi          = {10.1007/978-3-030-15887-3\_17},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/TiwariKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/VasanthiK19,
  author       = {K. Vasanthi and
                  N. Bala Kumar},
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {An Efficient Lung Image Classification Using {GDA} Based Feature Reduction
                  and Tree Classifier},
  booktitle    = {Handbook of Multimedia Information Security: Techniques and Applications},
  pages        = {645--666},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3\_31},
  doi          = {10.1007/978-3-030-15887-3\_31},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/VasanthiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/19/SM2019,
  editor       = {Amit Kumar Singh and
                  Anand Mohan},
  title        = {Handbook of Multimedia Information Security: Techniques and Applications},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15887-3},
  doi          = {10.1007/978-3-030-15887-3},
  isbn         = {978-3-030-15886-6},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/SM2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}