找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Noise Tolerant Data Authentication for Wireless Communication; Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG

[復(fù)制鏈接]
查看: 24288|回復(fù): 41
樓主
發(fā)表于 2025-3-21 17:44:36 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Noise Tolerant Data Authentication for Wireless Communication
編輯Obaid Ur-Rehman,Natasa Zivic
視頻videohttp://file.papertrans.cn/667/666780/666780.mp4
概述Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
叢書名稱Signals and Communication Technology
圖書封面Titlebook: Noise Tolerant Data Authentication for Wireless Communication;  Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG
描述This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book..Provides a discussion of data (particularly?image)?authentication methods in the presence of noise experienced in wireless communication;.Presents a new class of soft authenticatio
出版日期Book 2018
關(guān)鍵詞Soft Authentication; Image Authentication; Noise Tolerant Authentication; Content Based Image Authentic
版次1
doihttps://doi.org/10.1007/978-3-319-78942-2
isbn_softcover978-3-030-07686-3
isbn_ebook978-3-319-78942-2Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer International Publishing AG, part of Springer Nature 2018
The information of publication is updating

書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)




書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:55:18 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:25:18 | 只看該作者
地板
發(fā)表于 2025-3-22 07:26:44 | 只看該作者
5#
發(fā)表于 2025-3-22 12:30:16 | 只看該作者
6#
發(fā)表于 2025-3-22 15:02:38 | 只看該作者
7#
發(fā)表于 2025-3-22 18:58:34 | 只看該作者
8#
發(fā)表于 2025-3-22 22:11:04 | 只看該作者
Dual Watermarking,rrection codes. It is shown how the ability of tolerance to modifications, location of modified positions and (partial) reconstruction of image is achieved through the discussed method. Simulation results are presented for different channels and using different codes.
9#
發(fā)表于 2025-3-23 02:57:12 | 只看該作者
Digital Watermarking for Image Authentication,on are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.
10#
發(fā)表于 2025-3-23 05:37:48 | 只看該作者
Obaid Ur-Rehman,Natasa ZivicProvides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 18:37
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
无极县| 长阳| 南召县| 徐汇区| 常德市| 建湖县| 思南县| 成武县| 株洲市| 渭源县| 临漳县| 中卫市| 宁晋县| 天镇县| 沧州市| 女性| 克东县| 诸城市| 获嘉县| 东阿县| 南昌县| 杭州市| 山阴县| 时尚| 东源县| 新巴尔虎左旗| 荣成市| 安新县| 益阳市| 靖远县| 渝北区| 遵义县| 大田县| 麟游县| 酒泉市| 汉阴县| 庆阳市| 关岭| 娄烦县| 广平县| 临潭县|