|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-23403-8 |
003 |
DE-He213 |
005 |
20220116221812.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387234038
|9 978-0-387-23403-8
|
024 |
7 |
|
|a 10.1007/b101495
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
100 |
1 |
|
|a Uhl, Andreas.
|e author.
|0 (orcid)0000-0002-5921-8755
|1 https://orcid.org/0000-0002-5921-8755
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Image and Video Encryption
|h [electronic resource] :
|b From Digital Rights Management to Secured Personal Communication /
|c by Andreas Uhl, Andreas Pommer.
|
250 |
|
|
|a 1st ed. 2005.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2005.
|
300 |
|
|
|a XVII, 161 p. 65 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 15
|
505 |
0 |
|
|a Visual Data Formats -- Cryptography Primer -- Application Scenarios for the Encryption of Visual Data -- Image and Video Encryption -- Conclusions.
|
520 |
|
|
|a Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Multimedia systems.
|
650 |
|
0 |
|a Computer vision.
|
650 |
|
0 |
|a Image processing-Digital techniques.
|
650 |
|
0 |
|a Computer graphics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Multimedia Information Systems.
|
650 |
2 |
4 |
|a Computer Vision.
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|
650 |
2 |
4 |
|a Computer Graphics.
|
700 |
1 |
|
|a Pommer, Andreas.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441936257
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387503219
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387234021
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 15
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/b101495
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|