0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,904)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24,... Progress in Cryptology -- AFRICACRYPT 2013 - 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings (Paperback, 2013 ed.)
Amr Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.

Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10,... Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings (Paperback, 2013)
Goutam Paul, Paul Vaudenay
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.

Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2,... Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Angelos D. Keromytis
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.

Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International... Security and Protection in Information Processing Systems - IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22-27 August 2004 Toulouse, France (Paperback, Softcover reprint of the original 1st ed. 2004)
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang
R1,480 Discovery Miles 14 800 Ships in 18 - 22 working days

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September... Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings (Paperback, 2012 ed.)
Bart De Decker, David W. Chadwick
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.

Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7,... Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings (Paperback, 2012 ed.)
Simone Fischer-Hubner, Sokratis Katsikas, Gerald Quirchmayr
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and presentations of EU projects.

Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013,... Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings (Paperback, 2013 ed.)
Jason Crampton, Sushil Jajodia, Keith Mayes
R1,547 Discovery Miles 15 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012,... Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yun Q. Shi, Fernando Perez-Gonzalez, Hyoung Joong Kim
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.): Michael Hirsch, Panos M. Pardalos, Robert... Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.)
Michael Hirsch, Panos M. Pardalos, Robert Murphey
R3,810 Discovery Miles 38 100 Ships in 18 - 22 working days

Our understanding of information and information dynamics has outgrown classical information theory. The theory does not account for the value or influence of information within the context of a system or network and does not explain how these properties might influence how information flows though and interacts with a system. The invited chapters in this collection present new theories, methods, and applications that address some of these limitations.

Dynamics of Information Systems presents state-of-the-art research explaining the importance of information in the evolution of a distributed or networked system. This book presents techniques for measuring the value or significance of information within the context of a system. Each chapter reveals a unique topic or perspective from experts in this exciting area of research.

These newly developed techniques have numerous applications including: the detection of terrorist networks, the design of highly functioning businesses and computer systems, modeling the distributed sensory and control physiology of animals, quantum entanglement and genome modeling, multi-robotic systems design, as well as industrial and manufacturing safety.

Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised... Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Andrew A. Adams, Michael Brenner, Matthew Smith
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013,... Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Emmanuel Prouff
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.): Gianluigi Ferrari Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.)
Gianluigi Ferrari
R4,042 Discovery Miles 40 420 Ships in 18 - 22 working days

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.

E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback,... E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback, 2013 ed.)
James Heather, Steve Schneider, Vanessa Teague
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Cryptographic Hardware and Embedded Systems -- CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23,... Cryptographic Hardware and Embedded Systems -- CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings (Paperback, 2013 ed.)
Guido Marco Bertoni, Jean-Sebastien Coron
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Paperback, Softcover reprint of the original 1st ed. 2001)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,183 Discovery Miles 51 830 Ships in 18 - 22 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback,... Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback, 2013 ed.)
Philippe Gaborit
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.

Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings... Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings (Paperback, 2013 ed.)
Emiliano De Cristofaro, Matthew Wright
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.)
Feng-Hsing Wang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.): Harout Aydinian,... Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.)
Harout Aydinian, Ferdinando Cicalese, Christian Deppe
R1,548 Discovery Miles 15 480 Ships in 18 - 22 working days

This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains 36 thoroughly refereed research papers from a memorial symposium, which took place in July 2011.

Thefour macro-topics of this workshop: theory of games and strategic planning; combinatorial group testing and database mining; computational biology and string matching; information coding and spreading and patrolling on networks; provide a comprehensive picture of the vision Rudolf Ahlswede put forward of a broad and systematic theory of search.

Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993): V.V.... Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993)
V.V. Alexandrov, Gorsky.
R1,387 Discovery Miles 13 870 Ships in 18 - 22 working days

Recently, much attention has been paid to image processing with multiresolution and hierarchical structures such as pyramids and trees. This volume deals with recursive pyramids, which combine the advantages of available multiresolution structures and which are convenient both for global and local image processing. Recursive pyramids are based on regular hierarchical (recursive) structures containing data on image fragments of different sizes. Such an image representation technique enables the effective manipulation of pictorial information as well as the development of special hardware or data structures. The major aspects of this book are two original mathematical models of greyscale and binary images represented by recursive structures. Image compression, transmission and processing are discussed using these models. A number of applications are presented, including optical character recognition, expert systems and special computer architecture for pictorial data processing. The majority of results are presented as algorithms applicable to discrete information fields of arbitrary dimensions (e.g. 2-D or 3-D images). The book is divided into six chapters: Chapter 1 provides a brief introduction. Chapter 2 then deals with recursive structures and their properties. Chapter 3 introduces pyramidal image models. Image coding and the progressive transmission of images with gradual refinement are discussed in Chapter 4. Chapters 5 and 6 are devoted to image processing with pyramidal-recursive structures and applications. The volume concludes with a comprehensive bibliography. For applied mathematicians and computer scientists whose work involves computer vision, information theory and other aspects of image representation techniques.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptographic Boolean Functions and…
Thomas W Cusick, Pantelimon Stanica Paperback R1,920 Discovery Miles 19 200
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Stream Ciphers and Number Theory, Volume…
Thomas W Cusick, Cunsheng Ding, … Hardcover R2,957 Discovery Miles 29 570
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Tamam Shud - How the Somerton Man's Last…
Mohammad H. Tamdgidi Paperback R691 Discovery Miles 6 910
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Personalized Privacy Protection in Big…
Youyang Qu, Mohammad Reza Nosouhi, … Hardcover R1,738 Discovery Miles 17 380

 

Partners