Image and Video Encryption: From Digital Rights Management to Secured Personal Communication: Advances in Information Security, cartea 15
Autor Andreas Uhl, Andreas Pommeren Limba Engleză Hardback – 4 noi 2004
The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 610.68 lei 6-8 săpt. | |
Springer Us – 23 noi 2010 | 610.68 lei 6-8 săpt. | |
Hardback (1) | 616.97 lei 6-8 săpt. | |
Springer Us – 4 noi 2004 | 616.97 lei 6-8 săpt. |
Din seria Advances in Information Security
- 20% Preț: 622.80 lei
- 20% Preț: 1121.47 lei
- 20% Preț: 614.53 lei
- 15% Preț: 613.18 lei
- 20% Preț: 623.28 lei
- 20% Preț: 1108.45 lei
- 18% Preț: 966.72 lei
- 20% Preț: 524.56 lei
- 20% Preț: 1117.98 lei
- 20% Preț: 1010.84 lei
- 18% Preț: 1611.25 lei
- 20% Preț: 898.18 lei
- 20% Preț: 1127.50 lei
- 20% Preț: 931.50 lei
- 18% Preț: 913.12 lei
- 20% Preț: 958.00 lei
- 20% Preț: 620.28 lei
- 20% Preț: 618.98 lei
- 20% Preț: 623.11 lei
- 20% Preț: 623.60 lei
- 20% Preț: 627.87 lei
- 20% Preț: 618.67 lei
- 20% Preț: 616.15 lei
- 15% Preț: 615.41 lei
- 15% Preț: 613.36 lei
- 20% Preț: 789.44 lei
- 18% Preț: 1172.77 lei
- 15% Preț: 615.72 lei
- 24% Preț: 693.62 lei
Preț: 616.97 lei
Preț vechi: 725.84 lei
-15% Nou
Puncte Express: 925
Preț estimativ în valută:
118.08€ • 124.57$ • 98.40£
118.08€ • 124.57$ • 98.40£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780387234021
ISBN-10: 0387234020
Pagini: 161
Ilustrații: XVII, 161 p. 65 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.44 kg
Ediția:2005
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
ISBN-10: 0387234020
Pagini: 161
Ilustrații: XVII, 161 p. 65 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.44 kg
Ediția:2005
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Visual Data Formats.- Cryptography Primer.- Application Scenarios for the Encryption of Visual Data.- Image and Video Encryption.- Conclusions.
Recenzii
From the reviews:
"This compact book gives the reader a complete overview of the techniques used for the encryption of digital video and images. This is evidently of deep technical interest nowadays, with the growth of applications such as pay-per-view and digital video broadcasting on demand. … It is extremely readable, even for those who are not experts in this specific field. Practitioners and students will benefit from this book. … a pleasant and interesting read for researchers from other fields who want to approach video encryption technologies." (Stefano Zanero, Computing Reviews, August, 2005)
"This compact book gives the reader a complete overview of the techniques used for the encryption of digital video and images. This is evidently of deep technical interest nowadays, with the growth of applications such as pay-per-view and digital video broadcasting on demand. … It is extremely readable, even for those who are not experts in this specific field. Practitioners and students will benefit from this book. … a pleasant and interesting read for researchers from other fields who want to approach video encryption technologies." (Stefano Zanero, Computing Reviews, August, 2005)
Textul de pe ultima copertă
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).
Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements.
The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.
Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering.
Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements.
The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.
Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering.
Caracteristici
Provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material Introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....) Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material Includes supplementary material: sn.pub/extras