|
Showing 1 - 9 of
9 matches in All Departments
Since databases are the primary repositories of information for
today's organizations and governments, database security has become
critically important. Introducing the concept of multilevel
security in relational databases, this book provides a comparative
study of the various models that support multilevel security
policies in the relational database-illustrating the strengths and
weaknesses of each model. Multilevel Security for Relational
Databases covers multilevel database security concepts along with
many other multilevel database security models and techniques. It
presents a prototype that readers can implement as a tool for
conducting performance evaluations to compare multilevel secure
database models. The book supplies a complete view of an
encryption-based multilevel security database model that integrates
multilevel security for the relational database with a system that
encrypts each record with an encryption key according to its
security class level. This model will help you utilize an
encryption system as a second security layer over the multilevel
security layer for the database, reduce the multilevel database
size, and improve the response time of data retrieval from the
multilevel database. Considering instance-based multilevel database
security, the book covers relational database access controls and
examines concurrency control in multilevel database security
systems. It includes database encryption algorithms, simulation
programs, and Visual studio and Microsoft SQL Server code.
This book is devoted to the issue of image
super-resolution-obtaining high-resolution images from single or
multiple low-resolution images. Although there are numerous
algorithms available for image interpolation and super-resolution,
there's been a need for a book that establishes a common thread
between the two processes. Filling this need, Image
Super-Resolution and Applications presents image interpolation as a
building block in the super-resolution reconstruction process.
Instead of approaching image interpolation as either a
polynomial-based problem or an inverse problem, this book breaks
the mold and compares and contrasts the two approaches. It presents
two directions for image super-resolution: super-resolution with a
priori information and blind super-resolution reconstruction of
images. It also devotes chapters to the two complementary steps
used to obtain high-resolution images: image registration and image
fusion. Details techniques for color image interpolation and
interpolation for pattern recognition Analyzes image interpolation
as an inverse problem Presents image registration methodologies
Considers image fusion and its application in image super
resolution Includes simulation experiments along with the required
MATLAB (R) code Supplying complete coverage of image-super
resolution and its applications, the book illustrates applications
for image interpolation and super-resolution in medical and
satellite image processing. It uses MATLAB (R) programs to present
various techniques, including polynomial image interpolation and
adaptive polynomial image interpolation. MATLAB codes for most of
the simulation experiments supplied in the book are included in the
appendix.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
SC-FDMA for Mobile Communications examines Single-Carrier Frequency
Division Multiple Access (SC-FDMA). Explaining this rapidly
evolving system for mobile communications, it describes its
advantages and limitations and outlines possible solutions for
addressing its current limitations. The book explores the emerging
trend of cooperative communication with SC-FDMA and how it can
improve the physical layer security. It considers the design of
distributed coding schemes and protocols for wireless relay
networks where users cooperate to send their data to the
destination. Supplying you with the required foundation in
cooperative communication and cooperative diversity, it presents an
improved Discrete Cosine Transform (DCT)-based SC-FDMA system. It
introduces a distributed space-time coding scheme and evaluates its
performance and studies distributed SFC for broadband relay
channels. Presents relay selection schemes for improving the
physical layer Introduces a new transceiver scheme for the SC-FDMA
system Describes space-time/frequency coding schemes for SC-FDMA
Includes MATLAB (R) codes for all simulation experiments The book
investigates Carrier Frequency Offsets (CFO) for the Single-Input
Single-Output (SISO) SC-FDMA system, and Multiple-Input
Multiple-Output (MIMO) SC-FDMA system simulation software. Covering
the design of cooperative diversity schemes for the SC-FDMA system
in the uplink direction, it also introduces and studies a new
transceiver scheme for the SC-FDMA system.
SC-FDMA for Mobile Communications examines Single-Carrier Frequency
Division Multiple Access (SC-FDMA). Explaining this rapidly
evolving system for mobile communications, it describes its
advantages and limitations and outlines possible solutions for
addressing its current limitations. The book explores the emerging
trend of cooperative communication with SC-FDMA and how it can
improve the physical layer security. It considers the design of
distributed coding schemes and protocols for wireless relay
networks where users cooperate to send their data to the
destination. Supplying you with the required foundation in
cooperative communication and cooperative diversity, it presents an
improved Discrete Cosine Transform (DCT)-based SC-FDMA system. It
introduces a distributed space-time coding scheme and evaluates its
performance and studies distributed SFC for broadband relay
channels. Presents relay selection schemes for improving the
physical layer Introduces a new transceiver scheme for the SC-FDMA
system Describes space-time/frequency coding schemes for SC-FDMA
Includes MATLAB (R) codes for all simulation experiments The book
investigates Carrier Frequency Offsets (CFO) for the Single-Input
Single-Output (SISO) SC-FDMA system, and Multiple-Input
Multiple-Output (MIMO) SC-FDMA system simulation software. Covering
the design of cooperative diversity schemes for the SC-FDMA system
in the uplink direction, it also introduces and studies a new
transceiver scheme for the SC-FDMA system.
The author covers the fundamentals of both information and
communication security including current developments in some of
the most critical areas of automatic speech recognition. Included
are topics on speech watermarking, speech encryption,
steganography, multilevel security systems comprising speaker
identification, real transmission of watermarked or encrypted
speech signals, and more. The book is especially useful for
information security specialist, government security analysts,
speech development professionals, and for individuals involved in
the study and research of speech recognition at advanced levels.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
This book is devoted to the issue of image
super-resolution-obtaining high-resolution images from single or
multiple low-resolution images. Although there are numerous
algorithms available for image interpolation and super-resolution,
there's been a need for a book that establishes a common thread
between the two processes. Filling this need, Image
Super-Resolution and Applications presents image interpolation as a
building block in the super-resolution reconstruction process.
Instead of approaching image interpolation as either a
polynomial-based problem or an inverse problem, this book breaks
the mold and compares and contrasts the two approaches. It presents
two directions for image super-resolution: super-resolution with a
priori information and blind super-resolution reconstruction of
images. It also devotes chapters to the two complementary steps
used to obtain high-resolution images: image registration and image
fusion. Details techniques for color image interpolation and
interpolation for pattern recognition Analyzes image interpolation
as an inverse problem Presents image registration methodologies
Considers image fusion and its application in image super
resolution Includes simulation experiments along with the required
MATLAB (R) code Supplying complete coverage of image-super
resolution and its applications, the book illustrates applications
for image interpolation and super-resolution in medical and
satellite image processing. It uses MATLAB (R) programs to present
various techniques, including polynomial image interpolation and
adaptive polynomial image interpolation. MATLAB codes for most of
the simulation experiments supplied in the book are included in the
appendix.
Since databases are the primary repositories of information for
today's organizations and governments, database security has become
critically important. Introducing the concept of multilevel
security in relational databases, this book provides a comparative
study of the various models that support multilevel security
policies in the relational database-illustrating the strengths and
weaknesses of each model. Multilevel Security for Relational
Databases covers multilevel database security concepts along with
many other multilevel database security models and techniques. It
presents a prototype that readers can implement as a tool for
conducting performance evaluations to compare multilevel secure
database models. The book supplies a complete view of an
encryption-based multilevel security database model that integrates
multilevel security for the relational database with a system that
encrypts each record with an encryption key according to its
security class level. This model will help you utilize an
encryption system as a second security layer over the multilevel
security layer for the database, reduce the multilevel database
size, and improve the response time of data retrieval from the
multilevel database. Considering instance-based multilevel database
security, the book covers relational database access controls and
examines concurrency control in multilevel database security
systems. It includes database encryption algorithms, simulation
programs, and Visual studio and Microsoft SQL Server code.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|