Adversarial Multimedia Forensics (對抗性多媒體取證)
Nowroozi, Ehsan, Kallas, Kassem, Jolfaei, Alireza
- 出版商: Springer
- 出版日期: 2024-03-05
- 售價: $7,030
- 貴賓價: 9.5 折 $6,679
- 語言: 英文
- 頁數: 284
- 裝訂: Hardcover - also called cloth, retail trade, or trade
- ISBN: 303149802X
- ISBN-13: 9783031498022
-
相關分類:
數位影像處理 Digital-image、DeepLearning、資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$7,030$6,679 -
$1,880$1,786 -
$7,030$6,679 -
$4,510$4,285 -
$6,660$6,327 -
$4,880$4,636 -
$5,450$5,178 -
$2,600$2,470 -
$6,380$6,061 -
$6,660$6,327 -
$1,670$1,587 -
$4,530$4,304 -
$1,800$1,710 -
$5,710$5,425 -
$4,530$4,304 -
$7,050$6,698 -
$7,780$7,391 -
$4,050$3,848 -
$1,110$1,055 -
$1,110$1,055 -
$900$855 -
$1,020$969 -
$2,350$2,233 -
$2,300$2,185 -
$1,640$1,558
相關主題
商品描述
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book's content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs.
The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy.
Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource.
作者簡介
Dr. Kassem Kallas is a seasoned Research Scientist with expertise in the fields of Machine Learning (ML) and Artificial Intelligence (AI). He has a wealth of experience in applying these concepts to real-world problems. Dr. Kallas earned his Ph.D. in Information Engineering and Sciences from the University of Siena, Italy.He has worked on a variety of projects, including ones funded by renowned institutions such as DARPA, Air Force Research Laboratory (AFRL) of the U.S. government, and the Italian Ministry of University and Research (MUR) to research adversarial deep learning and adversarial signal processing. He worked on applying deep learning to wireless communication systems at the National Institute of Standards and Technology (NIST), USA.In addition to his academic and professional accomplishments, Dr. Kallas has gained valuable experience in the business and industrial sectors. He worked as an R&D scientist at ViDiTrust srl and AI consultant at Centrica-ImagineMore. Dr. Kallas is currently a research scientist at the French National Institute for Research in Digital Science and Technology (INRIA), where he continues to make significant contributions to the field. He has also been recognised for his achievements with the Best Paper Award at the Ninth International Conference on Advances in Multimedia (MMEDIA) in 2017 and top 3% paper award at ICASSP 2023. He is a Senior Member of IEEE and is part of the IEEE Young Professionals, IEEE Signal Processing Society, the European Association for Signal Processing (EURASIP), and Asia-Pacific Signal and Information Processing Association (APSIPA). In addition, he has been a reviewer at the IEEE WCNC'2016, IRACON-WS 2017, Inscrypt 2019 and iSES 2019 conferences and the IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Signal Processing, EURASIP Journal on Information Security and National Institute of Standards and Technology (NIST) journal of research. He has been a technical committee - PC member at the 51st International Carnahan Conference on Security Technology ICCST 2017, and a Session Chair for NGN and Network Management at IARIA Ninth International Conferences on Advances in Multimedia (MMEDIA), 2017. He also participated in the ITU AI/ML in 5G 2020 Challenge and proposed an AI-based solution to the problem statement "Beam-Selection in Millimeter-Wave MIMO Systems". His research interests include Game-theoretic concepts for Adversarial Signal Processing, pattern recognition, and image processing for anti-counterfeiting applications, and Machine Learning security threats and defences. In his spare time, Dr. Kallas volunteers as a mentor at IEEE Collabortec. He is also pursuing an Executive Master of Business Administration (E-MBA) in Strategic Leadership at Valar Institute at Quantic School of Business and Technology to further enhance his expertise in the field of business.
Dr. Alireza Jolfaei is an Associate Professor in Cybersecurity and Networking in the College of Science and Engineering at Flinders University. He is a Senior Member of the IEEE and a Distinguished Speaker of the ACM on the topic of Cybersecurity. He has previously been a faculty member with Macquarie University and Federation University in Australia, and Temple University in the USA. He received a Ph.D. degree in Applied Cryptography from Griffith University, Gold Coast, Australia. His main research interest is in Cyber-Physical Systems Security, where he investigates the hidden interdependencies in industrial communication protocols and aims to provide fundamentally new methods for security-aware modelling, analysis and design of safety-critical cyber-physical systems in the presence of cyber-adversaries. He has been a chief investigator of several internal and external grants with a total amount exceeding $2,6 million. He successfully supervised eight HDR students to completion. He received the prestigious IEEE Australian Council award for his research paper published in the IEEE Transactions on Information Forensics and Security.