Secure Image Transmission in Wireless Sensor Network (WSN) Applications (Record no. 76646)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03505nam a22005415i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-20816-5 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801214709.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190611s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783030208165 |
-- | 978-3-030-20816-5 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.384 |
100 1# - AUTHOR NAME | |
Author | Shankar, K. |
245 10 - TITLE STATEMENT | |
Title | Secure Image Transmission in Wireless Sensor Network (WSN) Applications |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | X, 161 p. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Electrical Engineering, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a “must-read” guide to the subject matter. |
700 1# - AUTHOR 2 | |
Author 2 | Elhoseny, Mohamed. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-030-20816-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Wireless communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational intelligence. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Wireless and Mobile Communication. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational Intelligence. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1876-1119 ; |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.