000 | 03968nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-78942-2 | ||
003 | DE-He213 | ||
005 | 20220801221247.0 | ||
007 | cr nn 008mamaa | ||
008 | 180331s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319789422 _9978-3-319-78942-2 |
||
024 | 7 |
_a10.1007/978-3-319-78942-2 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aUr-Rehman, Obaid. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _955000 |
|
245 | 1 | 0 |
_aNoise Tolerant Data Authentication for Wireless Communication _h[electronic resource] / _cby Obaid Ur-Rehman, Natasa Zivic. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXI, 73 p. 36 illus., 10 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSignals and Communication Technology, _x1860-4870 |
|
505 | 0 | _aChapter1: Introduction and the Need for Noise Tolerant Data Authentication -- Chapter2: Wireless Communications -- Chapter3: Noise Tolerant Data Authentication Mechanisms -- Chapter4: Digital Watermarking Techniques -- Chapter5: Dual Watermarking with Error Correction -- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests -- Chapter7: Authentication with Block Level Error Localization. | |
520 | _aThis book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aMultimedia systems. _911575 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aMultimedia Information Systems. _931575 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
700 | 1 |
_aZivic, Natasa. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _955001 |
|
710 | 2 |
_aSpringerLink (Online service) _955002 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319789415 |
776 | 0 | 8 |
_iPrinted edition: _z9783319789439 |
776 | 0 | 8 |
_iPrinted edition: _z9783030076863 |
830 | 0 |
_aSignals and Communication Technology, _x1860-4870 _955003 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-78942-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c79470 _d79470 |