找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Noise Tolerant Data Authentication for Wireless Communication; Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG

[復(fù)制鏈接]
查看: 24285|回復(fù): 41
樓主
發(fā)表于 2025-3-21 17:44:36 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Noise Tolerant Data Authentication for Wireless Communication
編輯Obaid Ur-Rehman,Natasa Zivic
視頻videohttp://file.papertrans.cn/667/666780/666780.mp4
概述Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
叢書名稱Signals and Communication Technology
圖書封面Titlebook: Noise Tolerant Data Authentication for Wireless Communication;  Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG
描述This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book..Provides a discussion of data (particularly?image)?authentication methods in the presence of noise experienced in wireless communication;.Presents a new class of soft authenticatio
出版日期Book 2018
關(guān)鍵詞Soft Authentication; Image Authentication; Noise Tolerant Authentication; Content Based Image Authentic
版次1
doihttps://doi.org/10.1007/978-3-319-78942-2
isbn_softcover978-3-030-07686-3
isbn_ebook978-3-319-78942-2Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer International Publishing AG, part of Springer Nature 2018
The information of publication is updating

書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)




書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:55:18 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:25:18 | 只看該作者
地板
發(fā)表于 2025-3-22 07:26:44 | 只看該作者
5#
發(fā)表于 2025-3-22 12:30:16 | 只看該作者
6#
發(fā)表于 2025-3-22 15:02:38 | 只看該作者
7#
發(fā)表于 2025-3-22 18:58:34 | 只看該作者
8#
發(fā)表于 2025-3-22 22:11:04 | 只看該作者
Dual Watermarking,rrection codes. It is shown how the ability of tolerance to modifications, location of modified positions and (partial) reconstruction of image is achieved through the discussed method. Simulation results are presented for different channels and using different codes.
9#
發(fā)表于 2025-3-23 02:57:12 | 只看該作者
Digital Watermarking for Image Authentication,on are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.
10#
發(fā)表于 2025-3-23 05:37:48 | 只看該作者
Obaid Ur-Rehman,Natasa ZivicProvides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 15:36
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
新邵县| 乡城县| 长阳| 凤冈县| 广元市| 望奎县| 高尔夫| 临颍县| 轮台县| 平利县| 天柱县| 本溪| 瓮安县| 昌吉市| 日土县| 贡嘎县| 甘南县| 江川县| 舟山市| 桂平市| 武城县| 榆社县| 顺平县| 米脂县| 锡林浩特市| 宜兴市| 海兴县| 武穴市| 富锦市| 板桥市| 舞阳县| 罗甸县| 广河县| 阿拉善左旗| 大宁县| 西华县| 崇左市| 金沙县| 历史| 牙克石市| 北票市|