|
Showing 1 - 9 of
9 matches in All Departments
Dieses Buch gibt einen Einblick in die Herausforderungen der
Datenauthentifizierung über drahtlose Kommunikationskanäle. Die
Autoren gehen davon aus, dass die etablierten
Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten
wie Sprache, Bilder und Videos über drahtlose Kanäle zu
authentifizieren, da die drahtlose Kommunikation durch zahlreiche
Störungen gekennzeichnet ist. Die Autoren schlagen neue
Mechanismen vor, die auf so genannten
Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen
an den zu schützenden Daten tolerieren. Die Autoren erklären,
dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber
inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein,
aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein
weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht
darin, dass sie in der Lage sind, die veränderten Stellen zu
identifizieren und sie nach Möglichkeit zu korrigieren. Die
Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale
mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert
Methoden zur Authentifizierung von Daten (insbesondere von Bildern)
bei Übertragungsstörungen, die bei der drahtlosen Kommunikation
auftreten; · Stellt eine neue Klasse von
Soft-Authentifizierungsmethoden vor, die anstelle der üblichen
Hard-Authentifizierungsmethoden verwendet werden, um geringfügige
Änderungen der Bilddaten zu tolerieren; · Verfügt über
Authentifizierungsmethoden, die auf der Verwendung von
Authentifizierungscodes und digitalen Wasserzeichen basieren
This book provides insight into the challenges in providing data
authentication over wireless communication channels. The authors
posit that established standard authentication mechanisms - for
wired devices - are not sufficient to authenticate data, such as
voice, images, and video over wireless channels. The authors
propose new mechanisms based on the so-called soft authentication
algorithms, which tolerate some legitimate modifications in the
data that they protect. The authors explain that the goal of these
algorithms is that they are tolerant to changes in the content but
are still able to identify the forgeries. The authors go on to
describe how an additional advantage of the soft authentication
algorithms is the ability to identify the locations of the
modifications and correct them if possible. The authors show how to
achieve this by protecting the data features with the help of error
correcting codes. The correction methods are typically based on
watermarking, as the authors discuss in the book. Provides a
discussion of data (particularly image) authentication methods in
the presence of noise experienced in wireless communication;
Presents a new class of soft authentication methods, instead of the
standard hard authentication methods, used to tolerate minor
changes in image data; Features authentication methods based on the
usage of authentication tags as well as digital watermarks.
This book provides insight into the challenges in providing data
authentication over wireless communication channels. The authors
posit that established standard authentication mechanisms - for
wired devices - are not sufficient to authenticate data, such as
voice, images, and video over wireless channels. The authors
propose new mechanisms based on the so-called soft authentication
algorithms, which tolerate some legitimate modifications in the
data that they protect. The authors explain that the goal of these
algorithms is that they are tolerant to changes in the content but
are still able to identify the forgeries. The authors go on to
describe how an additional advantage of the soft authentication
algorithms is the ability to identify the locations of the
modifications and correct them if possible. The authors show how to
achieve this by protecting the data features with the help of error
correcting codes. The correction methods are typically based on
watermarking, as the authors discuss in the book. Provides a
discussion of data (particularly image) authentication methods in
the presence of noise experienced in wireless communication;
Presents a new class of soft authentication methods, instead of the
standard hard authentication methods, used to tolerate minor
changes in image data; Features authentication methods based on the
usage of authentication tags as well as digital watermarks.
This book addresses the problems that hinder image authentication
in the presence of noise. It considers the advantages and
disadvantages of existing algorithms for image authentication and
shows new approaches and solutions for robust image authentication.
The state of the art algorithms are compared and, furthermore,
innovative approaches and algorithms are introduced. The introduced
algorithms are applied to improve image authentication,
watermarking and biometry. Aside from presenting new directions and
algorithms for robust image authentication in the presence of
noise, as well as image correction, this book also: Provides an
overview of the state of the art algorithms for image
authentication in the presence of noise and modifications, as well
as a comparison of these algorithms, Presents novel algorithms for
robust image authentication, whereby the image is tried to be
corrected and authenticated, Examines different views for the
solution of problems connected to image authentication in the
presence of noise, Shows examples, how the new techniques can be
applied to image authentication, watermarking and biometry. This
book is written on the one hand for students, who want to learn
about image processing, authentication, watermarking and biometry,
and on the other hand for engineers and researchers, who work on
aspects of robustness against modifications of secure images.
The book explains in a comprehensive way the basic terms of
communication engineering, giving a proper amount of the needed
mathematical background and explanations of the physical nature of
the problems. The theory of communication sciences is explained by
using knowledge and examples from real-world applications. The
information is presented in a way that is understandable also for
those who are not directly involved in communication sciences, but
would like to learn more about them.
This book addresses the problems that hinder image authentication
in the presence of noise. It considers the advantages and
disadvantages of existing algorithms for image authentication and
shows new approaches and solutions for robust image authentication.
The state of the art algorithms are compared and, furthermore,
innovative approaches and algorithms are introduced. The introduced
algorithms are applied to improve image authentication,
watermarking and biometry. Aside from presenting new directions and
algorithms for robust image authentication in the presence of
noise, as well as image correction, this book also: Provides an
overview of the state of the art algorithms for image
authentication in the presence of noise and modifications, as well
as a comparison of these algorithms, Presents novel algorithms for
robust image authentication, whereby the image is tried to be
corrected and authenticated, Examines different views for the
solution of problems connected to image authentication in the
presence of noise, Shows examples, how the new techniques can be
applied to image authentication, watermarking and biometry. This
book is written on the one hand for students, who want to learn
about image processing, authentication, watermarking and biometry,
and on the other hand for engineers and researchers, who work on
aspects of robustness against modifications of secure images.
Blockchains are seen as a technology for the future, which reduce
the cost of trust and revolutionize transactions between
individuals, companies and governments. The sense of using
blockchains is to minimize the probability of errors, successful
frauds and paper-intensive processes. For these reasons,
blockchains already have and will have a significant impact to the
society and every day's life, especially in field of Machine to
Machine (M2M) communications, which are one of the basic
technologies for Internet of Things (IoT). Therefore, blockchains
with their inherent property to provide security, privacy and
decentralized operation are engine for todays and future reliable,
autonomous and trusted IoT platforms. Specially, a disruptive role
of ledger technologies in future smart personal mobility systems,
which combine smart car industry, smart energy/smart cities will be
explained in the book, considering its importance for development
of new industrial and business models.
Autonomous driving is an emerging field. Vehicles are equipped with
different systems such as radar, lidar, GPS etc. that enable the
vehicle to make decisions and navigate without user's input, but
there are still concerns regarding safety and security. This book
analyses the security needs and solutions which are beneficial to
autonomous driving.
Researches in the field of the room acoustic emphasize the need to
harmonize the acoustic characteristics of the room and the
performed music so that the musical experience of a listener
matches his aesthetic comprehension of the sound. The first
researches in the domain of acoustic room design were mostly based
on the reverberation theory. In later researches priority was given
to early reflections and afterwords to lateral energy. Proceeding
from the assumption that the listener is the only criterion of the
room quality, we came to the notion of "the desired"
characteristics of the sound field in the room. The notion implies
the qualities of the sound field that listeners consider optimal in
the sense of the complete sound impression in the room. So, the
theory of subjectively desired characteristics of the sound field
as a specific theory in room acoustics was developed. As it is a
relatively new approach, there is the possibility for numerous
researches aiming at the implementation in theory and modeling the
theory. That possibility is used in this book which is specially
interesting for those in the field of music and audio engineering.
|
|