Cargando…

Image and Video Encryption From Digital Rights Management to Secured Personal Communication /

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Uhl, Andreas (Autor), Pommer, Andreas (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Advances in Information Security, 15
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-23403-8
003 DE-He213
005 20220116221812.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 |a 9780387234038  |9 978-0-387-23403-8 
024 7 |a 10.1007/b101495  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
100 1 |a Uhl, Andreas.  |e author.  |0 (orcid)0000-0002-5921-8755  |1 https://orcid.org/0000-0002-5921-8755  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Image and Video Encryption  |h [electronic resource] :  |b From Digital Rights Management to Secured Personal Communication /  |c by Andreas Uhl, Andreas Pommer. 
250 |a 1st ed. 2005. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2005. 
300 |a XVII, 161 p. 65 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 ;  |v 15 
505 0 |a Visual Data Formats -- Cryptography Primer -- Application Scenarios for the Encryption of Visual Data -- Image and Video Encryption -- Conclusions. 
520 |a Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Multimedia systems. 
650 0 |a Computer vision. 
650 0 |a Image processing-Digital techniques. 
650 0 |a Computer graphics. 
650 1 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Multimedia Information Systems. 
650 2 4 |a Computer Vision. 
650 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics. 
650 2 4 |a Computer Graphics. 
700 1 |a Pommer, Andreas.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441936257 
776 0 8 |i Printed edition:  |z 9780387503219 
776 0 8 |i Printed edition:  |z 9780387234021 
830 0 |a Advances in Information Security,  |x 2512-2193 ;  |v 15 
856 4 0 |u https://doi.uam.elogim.com/10.1007/b101495  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)