Articoli correlati a Noise Tolerant Data Authentication for Wireless Communicatio...

Noise Tolerant Data Authentication for Wireless Communication - Brossura

 
9783030076863: Noise Tolerant Data Authentication for Wireless Communication

Sinossi

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.

  • Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;
  • Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;
  • Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Obaid Ur-Rehman is a post-doctoral fellow at the chair for data communications systems of the University of Siegen in Germany. He received his M.Sc. degree in 2004 in Computer Engineering from the Faculty of Electrical Engineering at the University of Engineering and Technology, Taxila, Pakistan and his Dr.-Ing. degree in 2012 from the Chair for Data Communications Systems at the University of Siegen, Germany. During his doctoral research he worked on soft decoding techniques for error correcting codes and their applications in various fields, such as data and image authentication in the presence of noise and over wireless communication channels. Dr.-Ing. Ur-Rehman currently works as a scientific researcher at the Chair for Data Communications Systems at the University of Siegen, Germany. He is involved in various research projects funded by industry and the European Union. He has more than 10 years of industrial and academic experience. He is actively participating in conferencesand has given tutorials at various international conferences. He also serves as a reviewer for various international journals and has authored more than 30 scientific research publications in international journals and conferences.

Natasa Zivic is an Associated Professor and a Private Docent at the University of Siegen. She works as a lecturer at the University of Siegen since 2007, teaching Basics of Communication Techniques, Digital Communications Technologies I and Digital Communications Technologies II. She received Dipl.- Ing. degree (1999) and a Magister degree (2002) from the Faculty of Electrical Engineering at the University of Belgrade, Serbia. She started her research at the Chair for Data Communications Systems at the University of Siegen, Germany in October 2004. She received Dr.-Ing. Degree from the University Siegen, Faculty for Electrical and Computer Engineering in 2007 and continued her work as a lecturer and as a postdoctoral candidate. Shedefended her Postdoctoral Degree (Habilitation) in area of Electrical Engineering and Telecommunications from the University Siegen in 2012. Her actual areas of interest are connection between cryptography and standard communication techniques like channel coding, and applying of cryptography in communications, especially in noisy environments. She published about 100 journal and conference papers, 2 monographs and 3 patents (2 in Germany and 1 in USA). She works as a member of the German national body in ISO and as a project editor of security standards. She served as a TPC member and an organizer of several IEEE conferences/workshops and as a technical reviewer of several IEEE and other journals. She is a member of IEEE and IEEE Communication Society.

Dalla quarta di copertina

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms – for wired devices – are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.


  • Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;
  • Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;
  • Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreSpringer
  • Data di pubblicazione2018
  • ISBN 10 3030076865
  • ISBN 13 9783030076863
  • RilegaturaCopertina flessibile
  • LinguaInglese
  • Numero di pagine88
  • Contatto del produttore{language_tag:it_IT,value:"Springer Nature Customer Service Center GmbH; ProductSafety@springernature.com"}

EUR 9,70 per la spedizione da Germania a Italia

Destinazione, tempi e costi

Altre edizioni note dello stesso titolo

9783319789415: Noise Tolerant Data Authentication for Wireless Communication

Edizione in evidenza

ISBN 10:  3319789414 ISBN 13:  9783319789415
Casa editrice: Springer Nature, 2018
Rilegato

Risultati della ricerca per Noise Tolerant Data Authentication for Wireless Communicatio...

Immagini fornite dal venditore

Obaid Ur-Rehman|Natasa Zivic
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Brossura
Print on Demand

Da: moluna, Greven, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Provides a discussion of data (particularly&nbspimage)&nbspauthentication methods in the presence of noise experienced in wireless communicationPresents a new class of soft authentication methods, instead of the standard hard authentication meth. Codice articolo 448670871

Contatta il venditore

Compra nuovo

EUR 48,37
Convertire valuta
Spese di spedizione: EUR 9,70
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Natasa Zivic
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Taschenbuch
Print on Demand

Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. 88 pp. Englisch. Codice articolo 9783030076863

Contatta il venditore

Compra nuovo

EUR 53,49
Convertire valuta
Spese di spedizione: EUR 11,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Natasa Zivic
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Taschenbuch

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. Codice articolo 9783030076863

Contatta il venditore

Compra nuovo

EUR 53,49
Convertire valuta
Spese di spedizione: EUR 14,99
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Natasa Zivic
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Taschenbuch

Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. Neuware -This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms ¿ for wired devices ¿ are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 88 pp. Englisch. Codice articolo 9783030076863

Contatta il venditore

Compra nuovo

EUR 53,49
Convertire valuta
Spese di spedizione: EUR 15,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Ur-Rehman, Obaid
Editore: Springer, 2018
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Brossura

Da: Ria Christie Collections, Uxbridge, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. In. Codice articolo ria9783030076863_new

Contatta il venditore

Compra nuovo

EUR 59,66
Convertire valuta
Spese di spedizione: EUR 10,51
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Ur-Rehman, Obaid
Editore: Springer 2018-12, 2018
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo PF

Da: Chiron Media, Wallingford, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

PF. Condizione: New. Codice articolo 6666-IUK-9783030076863

Contatta il venditore

Compra nuovo

EUR 54,20
Convertire valuta
Spese di spedizione: EUR 23,38
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 10 disponibili

Aggiungi al carrello

Foto dell'editore

Ur-Rehman, Obaid
Editore: Springer, 2018
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Brossura

Da: Lucky's Textbooks, Dallas, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo ABLIING23Mar3113020004900

Contatta il venditore

Compra nuovo

EUR 57,71
Convertire valuta
Spese di spedizione: EUR 65,32
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Ur-Rehman, Obaid, Zivic, Natasa
Editore: Springer, 2018
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Paperback

Da: Mispah books, Redhill, SURRE, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. New. book. Codice articolo ERICA77330300768656

Contatta il venditore

Compra nuovo

EUR 99,98
Convertire valuta
Spese di spedizione: EUR 29,24
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Ur-Rehman, Obaid
Editore: Springer, 2018
ISBN 10: 3030076865 ISBN 13: 9783030076863
Nuovo Brossura

Da: Best Price, Torrance, CA, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. SUPER FAST SHIPPING. Codice articolo 9783030076863

Contatta il venditore

Compra nuovo

EUR 53,77
Convertire valuta
Spese di spedizione: EUR 94,06
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello