| 000 | 03237nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-23403-8 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083928.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2005 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387234038 _a99780387234038 |
||
| 024 | 7 |
_a10.1007/b101495 _2doi |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aJajodia, Sushil. _eeditor. |
|
| 245 | 1 | 0 |
_aImage and Video Encryption _h[recurso electrónico] : _bFrom Digital Rights Management to Secured Personal Communication / _cedited by Sushil Jajodia. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2005. |
|
| 300 |
_aXVII, 161 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v15 |
|
| 505 | 0 | _aVisual Data Formats -- Cryptography Primer -- Application Scenarios for the Encryption of Visual Data -- Image and Video Encryption -- Conclusions. | |
| 520 | _aImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption is designed for a professional audience composed of researchers and practitioners in industry. The book is also suitable for graduate-level students in computer science and electrical engineering. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aMULTIMEDIA SYSTEMS. | |
| 650 | 0 | _aCOMPUTER VISION. | |
| 650 | 0 | _aCOMPUTER GRAPHICS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aMULTIMEDIA INFORMATION SYSTEMS. |
| 650 | 2 | 4 | _aIMAGE PROCESSING AND COMPUTER VISION. |
| 650 | 2 | 4 | _aCOMPUTER IMAGING, VISION, PATTERN RECOGNITION AND GRAPHICS. |
| 650 | 2 | 4 | _aCOMPUTER GRAPHICS. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387234021 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v15 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/b101495 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56203 _d56203 |
||