Book Cover
E-book
Author International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications (1st : 2021 : Taichung, Taiwan)

Title 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications / George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang Lin, editors
Published Cham : Springer, 2023

Copies

Description 1 online resource (406 p.)
Series Smart Innovation, Systems and Technologies ; v.314
Smart innovation, systems, and technologies ; 314.
Contents Intro -- Organization -- Preface -- Contents -- About the Editors -- Multimedia -- Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- 1 Introduction -- 2 Related Works -- 2.1 Secret Embedding Procedure -- 2.2 Message Extracting and Image Recovery -- 3 The Proposed Method -- 3.1 Image Encryption and Secret Embedding -- 3.2 Message Extracting and Image Recovery -- 4 Experimental Result -- 5 Conclusion -- References -- Comments on the Visual Binary QR Code -- 1 Introduction -- 2 Schemes of Visual Binary QR Code -- 2.1 Unitag -- 2.2 QArt -- 2.3 Halftone QR Code -- 3 Comparisons
4 Conclusions -- References -- NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Hardware Architecture -- 3.2 Software Architecture -- 4 Experiments & Results -- 4.1 Application Components & Input Dataset -- 4.2 Accommodations for Lag -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Efficient Steganographic Method Based on Modulo Cube -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Preliminary Phase -- 3.2 Embedding Phase -- 3.3 Extraction phase
4 Experimental Results -- 5 Conclusions -- References -- A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding -- 1 Introduction -- 2 Proposed Method -- 2.1 Apply the Huffman Tree Building Algorithm -- 2.2 Reduce Reference Bytes -- 2.3 Remove the Redundant Length Column -- 3 Experimental Results -- 3.1 Commonly Used Test Images -- 4 Conclusion -- References -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- 1 Introduction -- 2 Qiu et al. Scheme -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusions
4.4 Validity Analysis -- 5 Results -- 5.1 The Structural Equation Modeling (SEM) Results for Mobile Payment Security-Mobile Payment Use Intention -- 5.2 The Impact of Consumers' Mobile Payment Security on Consumers' Mobile Payment Use Intention -- 6 Conclusions -- References -- Research on the Analysis of Key Attack Modes in a Wireless Environment -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 Method Architecture -- 2.2 Test Flow Chart -- 2.3 Introduction to WPA2 Four-Way Handshakes Process -- 3 Analysis of Key Attack Modes -- 3.1 Dictionary Cracking Mode -- 3.2 Script Cracking Mode
Summary This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas
Bibliography References -- Network and System Security (I) -- A Prototype Design on Privacy-Preserving Outsourced Bayesian Network -- 1 Introduction -- 2 Preliminaries -- 3 System Model -- 4 Construction -- 4.1 Building Blocks -- 4.2 Round Trick -- 4.3 Main Protocol -- 5 Analysis and Discussions -- 6 Conclusions -- References -- The Security Challenge of Consumers' Mobile Payment -- 1 Introduction -- 2 Consumers' Mobile Payment Use Intention -- 3 Consumers' Mobile Payment Security -- 4 Research Methodology -- 4.1 Sample and Data Sources -- 4.2 Variables and Measures -- 4.3 Reliability Analysis
Notes 3.3 Discussion and Comparison
Online resource; title from PDF title page (SpringerLink, viewed December 12, 2022)
Subject Artificial intelligence -- Congresses
Internet of things -- Congresses
Artificial intelligence
Internet of things
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Tsihrintzis, George A.
Wang, Shiuh-Jeng.
Lin, Iuon-Chang
ISBN 9783031054914
3031054911