找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Noise Tolerant Data Authentication for Wireless Communication; Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG

[復(fù)制鏈接]
查看: 24288|回復(fù): 41
樓主
發(fā)表于 2025-3-21 17:44:36 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Noise Tolerant Data Authentication for Wireless Communication
編輯Obaid Ur-Rehman,Natasa Zivic
視頻videohttp://file.papertrans.cn/667/666780/666780.mp4
概述Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
叢書名稱Signals and Communication Technology
圖書封面Titlebook: Noise Tolerant Data Authentication for Wireless Communication;  Obaid Ur-Rehman,Natasa Zivic Book 2018 Springer International Publishing AG
描述This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book..Provides a discussion of data (particularly?image)?authentication methods in the presence of noise experienced in wireless communication;.Presents a new class of soft authenticatio
出版日期Book 2018
關(guān)鍵詞Soft Authentication; Image Authentication; Noise Tolerant Authentication; Content Based Image Authentic
版次1
doihttps://doi.org/10.1007/978-3-319-78942-2
isbn_softcover978-3-030-07686-3
isbn_ebook978-3-319-78942-2Series ISSN 1860-4862 Series E-ISSN 1860-4870
issn_series 1860-4862
copyrightSpringer International Publishing AG, part of Springer Nature 2018
The information of publication is updating

書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)




書目名稱Noise Tolerant Data Authentication for Wireless Communication影響因子(影響力)學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度




書目名稱Noise Tolerant Data Authentication for Wireless Communication網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次




書目名稱Noise Tolerant Data Authentication for Wireless Communication被引頻次學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用




書目名稱Noise Tolerant Data Authentication for Wireless Communication年度引用學(xué)科排名




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋




書目名稱Noise Tolerant Data Authentication for Wireless Communication讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:55:18 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:25:18 | 只看該作者
地板
發(fā)表于 2025-3-22 07:26:44 | 只看該作者
5#
發(fā)表于 2025-3-22 12:30:16 | 只看該作者
6#
發(fā)表于 2025-3-22 15:02:38 | 只看該作者
7#
發(fā)表于 2025-3-22 18:58:34 | 只看該作者
8#
發(fā)表于 2025-3-22 22:11:04 | 只看該作者
Dual Watermarking,rrection codes. It is shown how the ability of tolerance to modifications, location of modified positions and (partial) reconstruction of image is achieved through the discussed method. Simulation results are presented for different channels and using different codes.
9#
發(fā)表于 2025-3-23 02:57:12 | 只看該作者
Digital Watermarking for Image Authentication,on are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.
10#
發(fā)表于 2025-3-23 05:37:48 | 只看該作者
Obaid Ur-Rehman,Natasa ZivicProvides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication.Presents a new class of soft authentication methods, instead of
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 18:37
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
绍兴县| 兴安盟| 澄城县| 鞍山市| 广西| 泗阳县| 都兰县| 雷州市| 伊春市| 叙永县| 日土县| 拉萨市| 闸北区| 宜良县| 乌拉特前旗| 满城县| 汉阴县| 绥中县| 漳浦县| 乐业县| 榕江县| 山阳县| 工布江达县| 防城港市| 舟曲县| 长治市| 舒兰市| 湖南省| 和平县| 林周县| 乡城县| 大姚县| 景洪市| 衡东县| 昌乐县| 陵川县| 阜康市| 墨脱县| 宁乡县| 和平区| 黑水县|