Multimedia Encryption and Authentication Techniques and Applications

Multimedia Encryption and Authentication Techniques and Applications

Author: Borko Furht

Publisher: CRC Press

Published: 2006-05-03

Total Pages: 408

ISBN-13: 1420013459

DOWNLOAD EBOOK

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des


Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Author: Nemati, Hamid R.

Publisher: IGI Global

Published: 2010-08-31

Total Pages: 407

ISBN-13: 1615207848

DOWNLOAD EBOOK

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.


Chaos-based Cryptography

Chaos-based Cryptography

Author: Ljupco Kocarev

Publisher: Springer Science & Business Media

Published: 2011-06-17

Total Pages: 400

ISBN-13: 3642205410

DOWNLOAD EBOOK

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.


Recent Advances in Multimedia Signal Processing and Communications

Recent Advances in Multimedia Signal Processing and Communications

Author: Mislav Grgic

Publisher: Springer Science & Business Media

Published: 2009-10-14

Total Pages: 657

ISBN-13: 3642028993

DOWNLOAD EBOOK

The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia applications. This book presents recent advances in Multimedia Signal Processing and Communications.


Digital Rights Management for E-Commerce Systems

Digital Rights Management for E-Commerce Systems

Author: Drossos, Lambros

Publisher: IGI Global

Published: 2008-10-31

Total Pages: 404

ISBN-13: 1605661198

DOWNLOAD EBOOK

"This book highlights innovative technologies used for the design and implementation of advanced e-commerce systems facilitating digital rights management and protection"--Provided by publisher.


Statistics and Analysis of Shapes

Statistics and Analysis of Shapes

Author: Hamid Krim

Publisher: Springer Science & Business Media

Published: 2007-12-31

Total Pages: 396

ISBN-13: 0817644814

DOWNLOAD EBOOK

The subject of pattern analysis and recognition pervades many aspects of our daily lives, including user authentication in banking, object retrieval from databases in the consumer sector, and the omnipresent surveillance and security measures around sensitive areas. Shape analysis, a fundamental building block in many approaches to these applications, is also used in statistics, biomedical applications (Magnetic Resonance Imaging), and many other related disciplines. With contributions from some of the leading experts and pioneers in the field, this self-contained, unified volume is the first comprehensive treatment of theory, methods, and algorithms available in a single resource. Developments are discussed from a rapidly increasing number of research papers in diverse fields, including the mathematical and physical sciences, engineering, and medicine.


Handbook of Financial Cryptography and Security

Handbook of Financial Cryptography and Security

Author: Burton Rosenberg

Publisher: CRC Press

Published: 2010-08-02

Total Pages: 631

ISBN-13: 1420059823

DOWNLOAD EBOOK

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing