Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). Encryption of visual data is an important topic in the area of multimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering.
Image processing --- Data encryption (Computer science) --- Telecommunication --- Copyright and electronic data processing. --- Security measures. --- Electronic data processing and copyright --- Copyright infringement --- Fair use (Copyright) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing
Choose an application
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- DIP (documentimage processing) --- beeldverwerking --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- multimedia --- programmatielogica --- KI (kunstmatige intelligentie)
Choose an application
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
Biometric identification. --- Image processing. --- Signal processing. --- Biometric identification --- Electrical & Computer Engineering --- Biology --- Health & Biological Sciences --- Engineering & Applied Sciences --- Biology - General --- Electrical Engineering --- Processing, Signal --- Pictorial data processing --- Picture processing --- Processing, Image --- Biometric person authentication --- Biometrics (Identification) --- Computer science. --- Computer security. --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Biometrics. --- Pattern Recognition. --- Systems and Data Security. --- Information measurement --- Signal theory (Telecommunication) --- Imaging systems --- Optical data processing --- Anthropometry --- Identification --- Optical pattern recognition. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Pattern perception --- Perceptrons --- Visual discrimination --- Protection --- Security measures --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Biological statistics --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods
Choose an application
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering.
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- DIP (documentimage processing) --- beeldverwerking --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- multimedia --- programmatielogica --- KI (kunstmatige intelligentie)
Choose an application
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
Mathematical statistics --- Biomathematics. Biometry. Biostatistics --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- factoranalyse --- biomathematica --- biostatistiek --- computers --- informatica --- biometrie --- computerbeveiliging --- computerkunde --- optica
Choose an application
Parallel processing (Electronic computers) --- Congresses --- 681.3*D1 --- Programming techniques--See also {681.3*E} --- Conferences - Meetings --- Computer Science --- Engineering & Applied Sciences --- 681.3*D1 Programming techniques--See also {681.3*E} --- Computer science. --- Architecture, Computer. --- Computer programming. --- Algorithms. --- Computer science --- Image processing. --- Numerical analysis. --- Computer Science. --- Computer System Implementation. --- Algorithm Analysis and Problem Complexity. --- Programming Techniques. --- Mathematics of Computing. --- Image Processing and Computer Vision. --- Numerical Analysis. --- Mathematics. --- Mathematical analysis --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Architecture, Computer --- Informatics --- Science --- Mathematics --- Foundations --- Programming --- Computer network architectures. --- Computer software. --- Computer vision. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Software, Computer --- Computer systems --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Computer science—Mathematics. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment --- Parallel processing (Electronic computers) - Congresses
Choose an application
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
Biometrics (Biology). --- Computer security. --- User interfaces (Computer systems). --- Biometrics. --- Systems and Data Security. --- User Interfaces and Human Computer Interaction. --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Protection --- Security measures --- Statistical methods --- Biometric identification --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- Computer science --- Computer security --- User interfaces (Computer systems)
Choose an application
It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19-21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28 were selected for presentation as full papers. In addition to these regular presentations, the CMS conference featured for the ?rst time a work in progress track that enabled authors to report preliminary results and ongoing work. These papers were presented in the form of a poster sessionduringtheconference;anextendedabstractofthepostersappearsinthis proceedings volume. From all papers submitted to the CMS conference, the p- gramcommitteechose13 submissionsfor inclusionin theworkinprogresstrack. In addition to regular presentations, CMS 2005 featured a special session on XMLsecurity,containingbothcontributedandinvitedtalks.Thisspecialsession was jointly organized by Rudig ¨ er Grimm (TU Ilmenau, Germany) and J¨ org Schwenk (Ruhr-Universit¨ at Bochum, Germany). Their assistance in organizing CMS 2005 was greatly appreciated.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- informatica --- maatschappij --- multimedia --- informatiesystemen --- informatica management --- computernetwerken
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- informatica --- maatschappij --- multimedia --- informatiesystemen --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- informatica management --- OS (operating system) --- computernetwerken
Listing 1 - 10 of 16 | << page >> |
Sort by
|