![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking -- Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.
The subject of computer communications is changing very rapidly. Improvements in terminal access, aligned with the development of timesharing, has brought hands-on experience to a large number of non specialist users. Computer networks have made available vast computing resources and data banks to these users. This book is for anyone familiar with using computers who wishes to understand the techniques used in computer communications. It is also an introduction to the architecture of present day computer communication systems. I would like to thank Roland lbbett, Steve Treadwell, Peter Kirstein and Del Thomas for their invaluable advice and encouragement. My thanks also to Malcolm Stewart and the staff at Macmillan. The late Gareth Pugh encouraged my interest in computer communications and provided the opportunity to develop the material for this book. The text was formatted on a UNIX computer system: I am grateful to Professor Kirstein for permission to use this system. I am indebted to NEC Telecommunications Europe for the use of a spinwriter printer on which the master copy was produced. Finally, no amount of words can express my debt to Jo this project and Rosemary for patiently bearing with over the last three years.
This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of grid and distributed computing, industrial environment, safety and health, and computer graphics, animation and game.
This book comprises selected papers of the 4th International Conference on Future Generation Information Technology, FGIT 2012, held in Gangneug, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advances in information technology. They were selected from the following 11 conferences: BSBT 2012, CGAG 2012, DCA 2012, DTA 2012, EL 2012, FGCN 2012, GDC 2012, IESH 2012, IUrC 2012, MulGraB 2012, and UNESST 2012.
These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a rigorous two-stage refereeing process. ToPNoC contains: - Revised versions of a selection of the best papers from workshops and tutorials at the annual Petri net conferences - Special sections/issues within particular subareas (similar to those published in the Advances in Petri Nets series) - Other papers invited for publication in ToPNoC - Papers submitted directly to ToPNoC by their authors. The sixth volume of ToPNoCincludes revised versions of selected papers from workshops and tutorials held at the 32nd International Conference on Application and Theory of Petri Nets and Concurrency. It alsocontainsa special section on Networks, Protocols, and Services, as well asa contributed paper submitted through the regular submission track of ToPNoC. The 14 papers cover a diverse range of topics including model checking and system verification, synthesis, foundational work on specific classes of Petri nets, and innovative applications of Petri nets and other models of concurrency. Thus this volume gives a good view of ongoing concurrent systems and Petri nets research."
Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.
In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.
This book presents exciting recent research on the compression of images and text. Part 1 presents the (lossy) image compression techniques of vector quantization, iterated transforms (fractal compression), and techniques that employ optical hardware. Part 2 presents the (lossless) text compression techniques of arithmetic coding, context modeling, and dictionary methods (LZ methods); this part of the book also addresses practical massively parallel architectures for text compression. Part 3 presents theoretical work in coding theory that has applications to both text and image compression. The book ends with an extensive bibliography of data compression papers and books which can serve as a valuable aid to researchers in the field. Points of Interest: * Data compression is becoming a key factor in the digital storage of text, speech graphics, images, and video, digital communications, data bases, and supercomputing. * The book addresses 'hot' data compression topics such as vector quantization, fractal compression, optical data compression hardware, massively parallel hardware, LZ methods, arithmetic coding. * Contributors are all accomplished researchers.* Extensive bibliography to aid researchers in the field.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.
Since the early 1990s, the wireless communications field has witnessed explosive growth. The wide range of applications and existing new technologies nowadays stimulated this enormous growth and encouraged wireless applications. The new wireless networks will support heterogeneous traffic, consisting of voice, video, and data (multimedia). This necessitated looking at new wireless generation technologies and enhance its capabilities. This includes new standards, new levels of Quality of Service (QoS), new sets of protocols and architectures, noise reduction, power control, performance enhancement, link and mobility management, nomadic and wireless networks security, and ad-hoc architectures. Many of these topics are covered in this textbook. The aim of this book is research and development in the area of broadband wireless communications and sensor networks. It is intended for researchers that need to learn more and do research on these topics. But, it is assumed that the reader has some background about wireless communications and networking. In addition to background in each of the chapters, an in-depth analysis is presented to help our readers gain more R&D insights in any of these areas. The book is comprised of 22 chapters, written by a group of well-known experts in their respective fields. Many of them have great industrial experience mixed with proper academic background.
This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.
This book constitutes the refereed proceedings of the 4th International Conference on Human-Centered Software Engineering, HCSE 2012, held in Toulouse, France, in October 2012. The twelve full papers and fourteen short papers presented were carefully reviewed and selected from various submissions. The papers cover the following topics: user interface design, examining the relationship between software engineering and human-computer interaction and on how to strengthen user-centered design as an essential part of software engineering process.
This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation Conference, AsiaSim 2012, and the International Conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.
This book constitutes the refereed conference proceedings of the 9th International Conference on Advances in Computer Entertainment, ACE 2012, held in Kathmandu, Nepal, in November 2012. The 10 full paper and 19 short papers presented together with 5 papers from the special track Arts and Culture and 35 extended abstracts were carefully reviewed and selected from a total of 140 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.
This book constitutes the proceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers presented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.
This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.
This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.
The papers in this volume were presented at the Second Annual Work shop on Active Middleware Services and were selected for inclusion here by the Editors. The AMS workshop was organized with support from both the National Science Foundation and the CAT center at the Uni versity of Arizona, and was held in Pittsburgh, Pennsylvania, on August 1, 2000, in conjunction with the 9th IEEE International Symposium on High Performance Distributed Computing (HPDC-9). The explosive growth of Internet-based applications and the prolifer ation of networking technologies has been transforming most areas of computer science and engineering as well as computational science and commercial application areas. This opens an outstanding opportunity to explore new, Internet-oriented software technologies that will open new research and application opportunities not only for the multimedia and commercial world, but also for the scientific and high-performance computing applications community. Two emerging technologies - agents and active networks - allow increased programmability to enable bring ing new services to Internet based applications. The AMS workshop presented research results and working papers in the areas of active net works, mobile and intelligent agents, software tools for high performance distributed computing, network operating systems, and application pro gramming models and environments. The success of an endeavor such as this depends on the contributions of many individuals. We would like to thank Dr. Frederica Darema and the NSF for sponsoring the workshop.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable. |
You may like...
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, …
Hardcover
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
|