Reprint

Advanced Mathematical Methods in Intelligent Multimedia: Security and Applications

Edited by
September 2023
260 pages
  • ISBN978-3-0365-8330-3 (Hardback)
  • ISBN978-3-0365-8331-0 (PDF)

This book is a reprint of the Special Issue Advanced Mathematical Methods in Intelligent Multimedia: Security and Applications that was published in

Computer Science & Mathematics
Engineering
Physical Sciences
Public Health & Healthcare
Summary

The area of intelligent multimedia involves the real-time computer processing and understanding of perceptual input from speech, textual and visual sources. The present reprint contains the 13 articles accepted and published in the Special Issue “Advanced Mathematical Methods in Intelligent Multimedia: Security and Applications” of the MDPI journal “Mathematics”, which cover a wide range of topics connected to the theory, security, and applications of these methods. These topics include, among others, elements from privacy computation, game theory-based models, cloud computing, big data, location privacy, artificial intelligence, reputation system, differential privacy, reversible data hiding, blockchain, etc.

It is hoped that the reprint will be interesting and useful for those working in the area of intelligent multimedia, security systems and privacy methods, as well as for those with the proper mathematical background who are willing to become familiar with recent advances of secure mathematics, which has nowadays entered into almost all sectors of human life and activity.

Format
  • Hardback
License
© 2022 by the authors; CC BY-NC-ND license
Keywords
reversible data hiding; pixel-value-ordering; prediction-error triplet expansion; prediction-error histogram; data hiding; halftone; quadtree; LSB matching; golden ratio; stochastic approximate algorithms; uncertain constrained k-means; approximation centers; secret image sharing; data hiding; meaningful shadow images; non-full rank linear model; data auditing; data integrity; bilinear map accumulator; blockchain; smart contract; IOTA; parasite chain attack; the tangle; evolutionary game; security; reversible watermarking; reversible data hiding; graph optimization; prediction error; differential privacy; machine learning; privacy protection; random forest; out-of-bag estimation; metaverse; blockchain; DPoS; video games; virtual economy; virtual worlds; artificial intelligence; security threat; adversarial attacks; adversarial examples; generative adversarial networks; public route planning; reverse trajectory query; encrypted trajectory database; private set intersection; homomorphic encryption; multi-key TFHE; cloud computing; privacy protection; DNS tunneling; DoH-based C2 covert channels; XGBoost; cooperative game theory; SHAP values; feature importance analysis; dimensionality reduction; imbalanced data; XAI