0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Symmetric Cryptographic Protocols (Hardcover, 2014 ed.): Mahalingam Ramkumar Symmetric Cryptographic Protocols (Hardcover, 2014 ed.)
Mahalingam Ramkumar
R4,151 R3,350 Discovery Miles 33 500 Save R801 (19%) Ships in 10 - 15 working days

This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Croxley Magnetic White Board (600x900mm…
R917 Discovery Miles 9 170
Sinotec 32" LED HD Ready TV
R2,199 R1,999 Discovery Miles 19 990
ZA Cute Puppy Love Paw Set (Necklace…
R712 R499 Discovery Miles 4 990
Dreambaby 9cm Extension - Liberty…
R365 R259 Discovery Miles 2 590
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990
Russell Hobbs Toaster (2 Slice…
R727 Discovery Miles 7 270
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Tower Pet Vinyl Sticker (Dog Mom)
R66 R54 Discovery Miles 540
AOC AGON AG275QXR 27" WQHD Gaming…
R11,499 R9,799 Discovery Miles 97 990
DR. Simply Gouache Set (24 x 12ml Tubes)
R859 R699 Discovery Miles 6 990

 

Partners