Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Multimedia Encryption and Authentication Techniques and Applications, Furht, Borko , Kirovski, Darko


Варианты приобретения
Цена: 9033.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Furht, Borko , Kirovski, Darko
Название:  Multimedia Encryption and Authentication Techniques and Applications
ISBN: 9780367453633
Издательство: Taylor&Francis
Классификация:


ISBN-10: 0367453630
Обложка/Формат: Paperback
Страницы: 408
Вес: 0.75 кг.
Дата издания: 29.11.2019
Серия: Internet and Communications
Язык: English
Размер: 234 x 156 x 21
Читательская аудитория: Tertiary education (us: college)
Основная тема: Internet & Multimedia
Рейтинг:
Поставляется из: Европейский союз
Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin


Multimedia Applications, Services and Techniques - ECMAST`99

Автор: Helmut Leopold; Narciso Garcia
Название: Multimedia Applications, Services and Techniques - ECMAST`99
ISBN: 3540660828 ISBN-13(EAN): 9783540660828
Издательство: Springer
Рейтинг:
Цена: 13974.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: These 37 revised papers cover: service and applications; multimedial terminals; content creation; physical broadcast infrastructure; multimedia over the Internet; metadata; 3D imaging; multicast protocols; security and protection; and mobility.

Authentication Codes and Combinatorial Designs

Автор: Pei, Dingyi
Название: Authentication Codes and Combinatorial Designs
ISBN: 0367391244 ISBN-13(EAN): 9780367391249
Издательство: Taylor&Francis
Рейтинг:
Цена: 9798.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially balanced designs (SPBD).

Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases.

Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication.

Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.

Noise Tolerant Data Authentication for Wireless Communication

Автор: Ur-Rehman
Название: Noise Tolerant Data Authentication for Wireless Communication
ISBN: 3319789414 ISBN-13(EAN): 9783319789415
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.

Robust Image Authentication in the Presence of Noise

Автор: Nata?a ?ivi?
Название: Robust Image Authentication in the Presence of Noise
ISBN: 3319380842 ISBN-13(EAN): 9783319380841
Издательство: Springer
Рейтинг:
Цена: 14365.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: State of the art image authentication algorithms for content based authentication.- Basic concepts.- Categories according to the feature extraction method.- The most popular algorithms for image authentication.- Authentication using watermarking.- Introduction.- Watermarking Embedding.- Watermarking Extraction.- State of the art fuzzy authentication schemes.- Elementary background and definitions.- Security analysis and adversary model.- Approximate message authentication code (AMAC).- Two provable secure fuzzy authentication schemes.- Design philosophy.- Conclusion.- Algorithms for image correction and authentication based on hard verification.- Elementary background and definitions.- Two approaches for noise tolerant authentication and correction of images.- An approach based on rotation-invariant image hashing scheme based on NMF matrix factorization.- Security of image authentication schemes.- Algorithms for image correction and authentication based on soft verification.- Soft Verification versus Hard Verification.- Soft Input Soft Verification.- Algorithms for correction and authentication of images.

Intelligent Multimedia Communication: Techniques and Applications

Автор: Chang Wen Chen; Zhu Li; Shiguo Lian
Название: Intelligent Multimedia Communication: Techniques and Applications
ISBN: 3642269435 ISBN-13(EAN): 9783642269431
Издательство: Springer
Рейтинг:
Цена: 22201.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explores aspects of multimedia data, including fundamental knowledge and the latest key techniques, and also typical applications and open issues. Coverage includes present and future video coding standards, free-viewpoint TV techniques, and more.

Information Hiding in Communication Networks

Автор: Mazurczyk Wojciech
Название: Information Hiding in Communication Networks
ISBN: 1118861698 ISBN-13(EAN): 9781118861691
Издательство: Wiley
Рейтинг:
Цена: 13773.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.

Noise Tolerant Data Authentication for Wireless Communication

Автор: Obaid Ur-Rehman; Natasa Zivic
Название: Noise Tolerant Data Authentication for Wireless Communication
ISBN: 3030076865 ISBN-13(EAN): 9783030076863
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.

Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.

ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия