Listing 1 - 10 of 446 | << page >> |
Sort by
|
Choose an application
Computer security --- Computer networks --- Cryptography --- Security measures --- Data protection --- Digital watermarking --- Watermarking, Digital --- Image steganography --- Watermarks
Choose an application
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension.
Data encryption (Computer science) --- Image processing --- Image steganography. --- Digital watermarking. --- Digital techniques.
Choose an application
Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Cryptography. --- Kryptologie
Choose an application
Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Criptografia --- Matemàtica
Choose an application
Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Cryptography.
Choose an application
L’énergie et l’information jouent un rôle important dans les sociétés modernes. Ces deux domaines ont un point commun : l’entropie. Celle-ci est reliée à l’irréversibilité des transformations énergétiques et permet de quantifier l’information pour mieux la traiter. La thermodynamique permet de comprendre les échanges de travail et de chaleur à l’échelle macroscopique. La physique statistique et la mécanique quantique en donnent une compréhension microscopique. Énergie, thermodynamique, physique statistique et mécanique quantique sont introduits à un niveau élémentaire. L’information occupe une place de plus en plus importante dans les sociétés modernes. Un message doit pouvoir être transmis rapidement, en toute sécurité, sans modification et en toute confidentialité. Ceci nécessite d’évaluer la quantité d’information qu’il contient pour coder celle-ci afin qu’il occupe le moins de place possible avant de le transmettre. Il faut être capable de détecter et corriger les erreurs toujours présentes lors de sa transmission et en assurer sa confidentialité (cryptographie). Ces points sont abordés dans plusieurs chapitres de cet ouvrage qui se termine par des notions de cybersécurité car outre les erreurs accidentelles existant lors de la transmission d’un message, il existe de plus en plus d’actions malveillantes visant à l’intercepter, le détruire, le modifier ou en prendre connaissance. Plus d’une centaine d’exercices avec un corrigé détaillé complètent l’ouvrage et permettent au lecteur de vérifier ses connaissances ou de les compléter.
Entropy. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Thermodynamics
Choose an application
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.
Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer security
Listing 1 - 10 of 446 | << page >> |
Sort by
|