0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

TV Content Analysis - Techniques and Applications (Hardcover, New): Yiannis Kompatsiaris, Bernard Merialdo, Shiguo Lian TV Content Analysis - Techniques and Applications (Hardcover, New)
Yiannis Kompatsiaris, Bernard Merialdo, Shiguo Lian
R3,761 Discovery Miles 37 610 Ships in 12 - 17 working days

The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV programs to enable applications for content managers and consumers. Leaving no stone unturned, TV Content Analysis: Techniques and Applications provides a detailed exploration of TV program analysis techniques.
Leading researchers and academics from around the world supply scientifically sound treatment of recent developments across the related subject areas including systems, architectures, algorithms, applications, research results, emerging approaches, and open issues. The book is organized into six parts:

  1. Content Extraction - deals with automatic analysis and annotation of TV content, addressing generic semantics and concepts as well as TV content
  2. Content Structuring - examines techniques for identifying interesting parts of TV programs and supplying direct access to it
  3. Content Recommendation - explores the problem of providing users with the most relevant content, addressing the problem of an ever-increasing amount of available content
  4. Content Quality - considers visual perception and quality approaches in the multi-display TV context and the specific mobile TV scenario
  5. Web and Social TV - presents studies on Web and TV convergence and on how user-generated content in Web 2.0 applications can be used to enhance services
  6. Content Production - covers postproduction, visual effects, and presentation standards

Most parts start with a chapter that provides an overview of that area, followed by state-of-the-art approaches focusing on specific issues covered in that section. Reporting on recent advances in the field, the book provides you with the global view and up-to-date understanding of emerging trends needed to participate in the development of the digital TV domain.

Chaos-based Cryptography - Theory, Algorithms and Applications (Paperback, Softcover reprint of the original 1st ed. 2011):... Chaos-based Cryptography - Theory, Algorithms and Applications (Paperback, Softcover reprint of the original 1st ed. 2011)
Ljupco Kocarev, Shiguo Lian
R4,566 Discovery Miles 45 660 Ships in 10 - 15 working days

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Security and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009,... Security and Privacy in Mobile Information and Communication Systems - First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Shiguo Lian
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications

Intelligent Computing Based on Chaos (Hardcover, 2009 ed.): Ljupco Kocarev, Zbigniew Galias, Shiguo Lian Intelligent Computing Based on Chaos (Hardcover, 2009 ed.)
Ljupco Kocarev, Zbigniew Galias, Shiguo Lian
R6,001 Discovery Miles 60 010 Ships in 10 - 15 working days

Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Obser- tions of chaotic behavior in nature include weather and climate, the dynamics of sat- lites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. To the best of our knowledge, this is the first book edited on chaos applications in intelligent computing. To access the latest research related to chaos applications in intelligent computing, we launched the book project where researchers from all over the world provide the necessary coverage of the mentioned field. The primary obj- tive of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most c- prehensive list of research references.

Intelligent Multimedia Communication: Techniques and Applications (Paperback, 2011 ed.): Chang Wen Chen, Zhu Li, Shiguo Lian Intelligent Multimedia Communication: Techniques and Applications (Paperback, 2011 ed.)
Chang Wen Chen, Zhu Li, Shiguo Lian
R4,556 Discovery Miles 45 560 Ships in 10 - 15 working days

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers' properties to improve the network's resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network's bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.

Intelligent Multimedia Analysis for Security Applications (Paperback, 2010 ed.): Husrev T. Sencar, Sergio Velastin, Nikolaos... Intelligent Multimedia Analysis for Security Applications (Paperback, 2010 ed.)
Husrev T. Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian
R4,523 Discovery Miles 45 230 Ships in 10 - 15 working days

The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.

Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.): Ljupco Kocarev, Shiguo Lian Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.)
Ljupco Kocarev, Shiguo Lian
R4,569 Discovery Miles 45 690 Ships in 10 - 15 working days

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Intelligent Computing Based on Chaos (Paperback, Softcover reprint of hardcover 1st ed. 2009): Ljupco Kocarev, Zbigniew Galias,... Intelligent Computing Based on Chaos (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Ljupco Kocarev, Zbigniew Galias, Shiguo Lian
R5,789 Discovery Miles 57 890 Ships in 10 - 15 working days

Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Obser- tions of chaotic behavior in nature include weather and climate, the dynamics of sat- lites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. To the best of our knowledge, this is the first book edited on chaos applications in intelligent computing. To access the latest research related to chaos applications in intelligent computing, we launched the book project where researchers from all over the world provide the necessary coverage of the mentioned field. The primary obj- tive of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most c- prehensive list of research references.

Intelligent Multimedia Analysis for Security Applications (Hardcover, 2010 Ed.): Husrev T. Sencar, Sergio Velastin, Nikolaos... Intelligent Multimedia Analysis for Security Applications (Hardcover, 2010 Ed.)
Husrev T. Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian
R4,572 Discovery Miles 45 720 Ships in 10 - 15 working days

The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.

Handbook of Research on Secure Multimedia Distribution (Hardcover): Shiguo Lian, Yan Zhang Handbook of Research on Secure Multimedia Distribution (Hardcover)
Shiguo Lian, Yan Zhang
R7,543 Discovery Miles 75 430 Ships in 10 - 15 working days

New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academidans, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. ""The Handbook of Research on Secure Multimedia Distribution"" provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution. This title offers: 27 authoritative contributions by over 55 of the world's leading experts on secure multimedia distribution from 17 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 960 references to existing literature and research on secure multimedia distribution; a compendium of over 225 key terms with detailed definitions. This title is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It features cross-referencing of key terms, figures, and information pertinent to secure multimedia distribution and free institution-wide access to the online version with the purchase of the print publication.

Multimedia Communication Security - Recent Advances (Hardcover, New): Shiguo Lian Multimedia Communication Security - Recent Advances (Hardcover, New)
Shiguo Lian
R3,138 R2,004 Discovery Miles 20 040 Save R1,134 (36%) Ships in 12 - 17 working days

This book presents a collection of quality chapters on multimedia communication security contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provides a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT/multimedia practitioners who are interested or involved in the study, research, use, design and development of techniques related to multimedia content protection.

Multimedia Content Encryption - Techniques and Applications (Hardcover): Shiguo Lian Multimedia Content Encryption - Techniques and Applications (Hardcover)
Shiguo Lian
R3,544 Discovery Miles 35 440 Ships in 12 - 17 working days

"How to Design a Secure Multimedia Encryption Scheme"


The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: "Techniques and Applications" presents the latest research results in this dynamic field.

Examines the Latest Encryption Techniques

The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage.

Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect theintegrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990
Bostik Clear on Blister Card (25ml)
R33 Discovery Miles 330
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge Hardcover R299 R246 Discovery Miles 2 460
Hart Easy Pour Kettle (1.5L)
R199 R168 Discovery Miles 1 680
Sony PlayStation 5 Slim Console (Glacier…
R15,299 Discovery Miles 152 990
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Complete Snack-A-Chew Iced Dog Biscuits…
R110 R104 Discovery Miles 1 040
Rex Dog Potty Patch (43cm x 68cm)
R419 R329 Discovery Miles 3 290

 

Partners