Multimedia Encryption and Authentication Techniques and Applications, Furht, Borko , Kirovski, Darko
Автор: Helmut Leopold; Narciso Garcia Название: Multimedia Applications, Services and Techniques - ECMAST`99 ISBN: 3540660828 ISBN-13(EAN): 9783540660828 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: These 37 revised papers cover: service and applications; multimedial terminals; content creation; physical broadcast infrastructure; multimedia over the Internet; metadata; 3D imaging; multicast protocols; security and protection; and mobility.
Автор: Pei, Dingyi Название: Authentication Codes and Combinatorial Designs ISBN: 0367391244 ISBN-13(EAN): 9780367391249 Издательство: Taylor&Francis Рейтинг: Цена: 9798.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially balanced designs (SPBD).
Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases. Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication. Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.
Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.
Автор: Nata?a ?ivi? Название: Robust Image Authentication in the Presence of Noise ISBN: 3319380842 ISBN-13(EAN): 9783319380841 Издательство: Springer Рейтинг: Цена: 14365.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: State of the art image authentication algorithms for content based authentication.- Basic concepts.- Categories according to the feature extraction method.- The most popular algorithms for image authentication.- Authentication using watermarking.- Introduction.- Watermarking Embedding.- Watermarking Extraction.- State of the art fuzzy authentication schemes.- Elementary background and definitions.- Security analysis and adversary model.- Approximate message authentication code (AMAC).- Two provable secure fuzzy authentication schemes.- Design philosophy.- Conclusion.- Algorithms for image correction and authentication based on hard verification.- Elementary background and definitions.- Two approaches for noise tolerant authentication and correction of images.- An approach based on rotation-invariant image hashing scheme based on NMF matrix factorization.- Security of image authentication schemes.- Algorithms for image correction and authentication based on soft verification.- Soft Verification versus Hard Verification.- Soft Input Soft Verification.- Algorithms for correction and authentication of images.
Автор: Chang Wen Chen; Zhu Li; Shiguo Lian Название: Intelligent Multimedia Communication: Techniques and Applications ISBN: 3642269435 ISBN-13(EAN): 9783642269431 Издательство: Springer Рейтинг: Цена: 22201.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores aspects of multimedia data, including fundamental knowledge and the latest key techniques, and also typical applications and open issues. Coverage includes present and future video coding standards, free-viewpoint TV techniques, and more.
Автор: Mazurczyk Wojciech Название: Information Hiding in Communication Networks ISBN: 1118861698 ISBN-13(EAN): 9781118861691 Издательство: Wiley Рейтинг: Цена: 13773.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.
Автор: Obaid Ur-Rehman; Natasa Zivic Название: Noise Tolerant Data Authentication for Wireless Communication ISBN: 3030076865 ISBN-13(EAN): 9783030076863 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.
Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru