0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018): Obaid Ur-Rehman, Natasa Zivic Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Robust Image Authentication in the Presence of Noise (Hardcover, 2015 ed.): Natasa Zivic Robust Image Authentication in the Presence of Noise (Hardcover, 2015 ed.)
Natasa Zivic
R3,992 R3,344 Discovery Miles 33 440 Save R648 (16%) Ships in 12 - 17 working days

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

Security in Autonomous Driving (Hardcover): Obaid Ur-Rehman, Natasa Zivic Security in Autonomous Driving (Hardcover)
Obaid Ur-Rehman, Natasa Zivic
R3,909 Discovery Miles 39 090 Ships in 12 - 17 working days

Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.

Störungstolerante Datenauthentifizierung für drahtlose Kommunikation: Obaid Ur-Rehman, Natasa Zivic Störungstolerante Datenauthentifizierung für drahtlose Kommunikation
Obaid Ur-Rehman, Natasa Zivic
R2,499 Discovery Miles 24 990 Ships in 10 - 15 working days

Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basieren

Noise Tolerant Data Authentication for Wireless Communication (Paperback, Softcover reprint of the original 1st ed. 2018):... Noise Tolerant Data Authentication for Wireless Communication (Paperback, Softcover reprint of the original 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Robust Image Authentication in the Presence of Noise (Paperback, Softcover reprint of the original 1st ed. 2015): Natasa Zivic Robust Image Authentication in the Presence of Noise (Paperback, Softcover reprint of the original 1st ed. 2015)
Natasa Zivic
R3,322 Discovery Miles 33 220 Ships in 10 - 15 working days

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

Modern Communications Technology (Paperback, Digital original): Natasa Zivic Modern Communications Technology (Paperback, Digital original)
Natasa Zivic
R1,669 R1,325 Discovery Miles 13 250 Save R344 (21%) Ships in 10 - 15 working days

The book explains in a comprehensive way the basic terms of communication engineering, giving a proper amount of the needed mathematical background and explanations of the physical nature of the problems. The theory of communication sciences is explained by using knowledge and examples from real-world applications. The information is presented in a way that is understandable also for those who are not directly involved in communication sciences, but would like to learn more about them.

Blockchain - Technology and Applications for Industry 4.0, Smart Energy, and Smart Cities (Paperback): Matevz Pustisek, Natasa... Blockchain - Technology and Applications for Industry 4.0, Smart Energy, and Smart Cities (Paperback)
Matevz Pustisek, Natasa Zivic, Andrej Kos
R1,221 R971 Discovery Miles 9 710 Save R250 (20%) Ships in 10 - 15 working days

Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. The sense of using blockchains is to minimize the probability of errors, successful frauds and paper-intensive processes. For these reasons, blockchains already have and will have a significant impact to the society and every day's life, especially in field of Machine to Machine (M2M) communications, which are one of the basic technologies for Internet of Things (IoT). Therefore, blockchains with their inherent property to provide security, privacy and decentralized operation are engine for todays and future reliable, autonomous and trusted IoT platforms. Specially, a disruptive role of ledger technologies in future smart personal mobility systems, which combine smart car industry, smart energy/smart cities will be explained in the book, considering its importance for development of new industrial and business models.

Autocorrelation Function of the Music Signal (Paperback): Natasa Zivic Autocorrelation Function of the Music Signal (Paperback)
Natasa Zivic
R1,459 Discovery Miles 14 590 Ships in 10 - 15 working days

Researches in the field of the room acoustic emphasize the need to harmonize the acoustic characteristics of the room and the performed music so that the musical experience of a listener matches his aesthetic comprehension of the sound. The first researches in the domain of acoustic room design were mostly based on the reverberation theory. In later researches priority was given to early reflections and afterwords to lateral energy. Proceeding from the assumption that the listener is the only criterion of the room quality, we came to the notion of "the desired" characteristics of the sound field in the room. The notion implies the qualities of the sound field that listeners consider optimal in the sense of the complete sound impression in the room. So, the theory of subjectively desired characteristics of the sound field as a specific theory in room acoustics was developed. As it is a relatively new approach, there is the possibility for numerous researches aiming at the implementation in theory and modeling the theory. That possibility is used in this book which is specially interesting for those in the field of music and audio engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
Ravensburger Marvel Jigsaw Puzzles…
R299 R250 Discovery Miles 2 500
Cadac 47cm Paella Pan
R1,215 Discovery Miles 12 150
Cellphone Ring & Stand [Black]
R22 Discovery Miles 220
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R320 R250 Discovery Miles 2 500
Efekto Malasol Insecticide Concentrate…
R95 Discovery Miles 950
Microsoft Xbox Series X Console (1TB…
R14,999 Discovery Miles 149 990
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R256 Discovery Miles 2 560
Catan
 (16)
R889 Discovery Miles 8 890
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 Discovery Miles 89 990

 

Partners