Revision with unchanged content. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2. Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3. Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4. Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5. Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs.
"synopsis" may belong to another edition of this title.
Kannan Karthik, Ph.D. (Univ. of Toronto), is an Assistant Professor in the department of Electronics and Communication Engineering at the Indian Institute of Technology (IIT) Guwahati.Dimitrios Hatzinakos, Ph.D., is a Professor of Electrical and Computer Engineering at the University of Toronto. He is the holder of the Bell Canada Chair in Multimedia, and director of Identity, Privacy and Security Initiative (IPSI) at the University of Toronto.
"About this title" may belong to another edition of this title.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Revision with unchanged content. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2. Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3. Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4. Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5. Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs. 168 pp. Englisch. Seller Inventory # 9783639452976
Quantity: 2 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Karthik KannanKannan Karthik, Ph.D. (Univ. of Toronto), is an Assistant Professor in the department of Electronics and Communication Engineering at the Indian Institute of Technology (IIT) Guwahati.Dimitrios Hatzinakos, Ph.D., is a P. Seller Inventory # 4989491
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Revision with unchanged content. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2. Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3. Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4. Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5. Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 168 pp. Englisch. Seller Inventory # 9783639452976
Quantity: 1 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Revision with unchanged content. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to 1. Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2. Introduce methodologies for constructing collusion resistant semi-fragile fingerprints. 3. Provide efficient and illustrative algorithms for construction of anti-collusion codes (ACC) (a) By Edge coloring, (b) Using Hadamard 2-designs. 4. Explore the multi-faceted nature of a non-perfect secret sharing algorithm called MIX-SPLIT and its properties of Association, Inheritance, Anonymity with traceability and Closure. 5. Present several practical application scenarios such as the protection and tracking of highly sensitive medical records, selective access of strategic maps and distributed secure storage of biometric PINs. Seller Inventory # 9783639452976
Quantity: 1 available