Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 12 of 12 matches in All Departments
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academidans, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. ""The Handbook of Research on Secure Multimedia Distribution"" provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution. This title offers: 27 authoritative contributions by over 55 of the world's leading experts on secure multimedia distribution from 17 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 960 references to existing literature and research on secure multimedia distribution; a compendium of over 225 key terms with detailed definitions. This title is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It features cross-referencing of key terms, figures, and information pertinent to secure multimedia distribution and free institution-wide access to the online version with the purchase of the print publication.
Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Obser- tions of chaotic behavior in nature include weather and climate, the dynamics of sat- lites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. To the best of our knowledge, this is the first book edited on chaos applications in intelligent computing. To access the latest research related to chaos applications in intelligent computing, we launched the book project where researchers from all over the world provide the necessary coverage of the mentioned field. The primary obj- tive of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most c- prehensive list of research references.
The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
The rapid advancement of digital multimedia technologies has not
only revolutionized the production and distribution of audiovisual
content, but also created the need to efficiently analyze TV
programs to enable applications for content managers and consumers.
Leaving no stone unturned, TV Content Analysis: Techniques and
Applications provides a detailed exploration of TV program analysis
techniques.
Most parts start with a chapter that provides an overview of that area, followed by state-of-the-art approaches focusing on specific issues covered in that section. Reporting on recent advances in the field, the book provides you with the global view and up-to-date understanding of emerging trends needed to participate in the development of the digital TV domain.
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers' properties to improve the network's resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network's bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.
Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Obser- tions of chaotic behavior in nature include weather and climate, the dynamics of sat- lites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. To the best of our knowledge, this is the first book edited on chaos applications in intelligent computing. To access the latest research related to chaos applications in intelligent computing, we launched the book project where researchers from all over the world provide the necessary coverage of the mentioned field. The primary obj- tive of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most c- prehensive list of research references.
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications
This book presents a collection of quality chapters on multimedia communication security contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provides a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT/multimedia practitioners who are interested or involved in the study, research, use, design and development of techniques related to multimedia content protection.
"How to Design a Secure Multimedia Encryption Scheme"
Examines the Latest Encryption Techniques The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage. Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect theintegrity of their multimedia data and develop greater confidence that their data will not be misappropriated.
|
You may like...
|