The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1.Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2.Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3.Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4.Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5.Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Revision with unchanged content. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2. Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3. Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4. Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5. Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs.
Kannan Karthik, Ph.D. (Univ. of Toronto), is an Assistant Professor in the department of Electronics and Communication Engineering at the Indian Institute of Technology (IIT) Guwahati.Dimitrios Hatzinakos, Ph.D., is a Professor of Electrical and Computer Engineering at the University of Toronto. He is the holder of the Bell Canada Chair in Multimedia, and director of Identity, Privacy and Security Initiative (IPSI) at the University of Toronto.
Dimitrios Hatzinakos, Ph.D., is a Professor of Electrical and Computer Engineering at the University of Toronto. He is the holder of the Bell Canada Chair in Multimedia, and director of Identity, Privacy and Security Initiative (IPSI) at the University of Toronto. His interests are in Multimedia Signal Processing and Communications.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783836436380
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783836436380
Quantité disponible : Plus de 20 disponibles
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9783836436380
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783836436380_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Paperback. Etat : New. N° de réf. du vendeur 6666-IUK-9783836436380
Quantité disponible : 10 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. N° de réf. du vendeur 598300748
Quantité disponible : Plus de 20 disponibles
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2.Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3.Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4.Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5.Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs. N° de réf. du vendeur 9783836436380
Quantité disponible : 2 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
Paperback. Etat : Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA79638364363886
Quantité disponible : 1 disponible(s)