Seller: WeBuyBooks, Rossendale, LANCS, United Kingdom
US$ 32.81
Convert currencyQuantity: 1 available
Add to basketCondition: Like New. Most items will be dispatched the same or the next working day. An apparently unread copy in perfect condition. Dust cover is intact with no nicks or tears. Spine has no signs of creasing. Pages are clean and not marred by notes or folds of any kind.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 65.67
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 64.33
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 64.33
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING.
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 72.10
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by Springer International Publishing AG, Cham, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Language: English
Seller: Grand Eagle Retail, Mason, OH, U.S.A.
First Edition
Hardcover. Condition: new. Hardcover. This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms for wired devices are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 68.59
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 70.38
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
US$ 65.51
Convert currencyQuantity: 10 available
Add to basketPaperback. Condition: New.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 70.36
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 77.17
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
US$ 89.06
Convert currencyQuantity: 15 available
Add to basketCondition: New. 2018. Paperback. . . . . .
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
US$ 99.75
Convert currencyQuantity: 15 available
Add to basketCondition: New.
Seller: Kennys Bookstore, Olney, MD, U.S.A.
Condition: New. 2018. Paperback. . . . . . Books ship from the US and Ireland.
Condition: New.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 97.08
Convert currencyQuantity: 2 available
Add to basketHardcover. Condition: Brand New. 88 pages. 9.25x6.10x0.63 inches. In Stock.
Published by Springer, Berlin, Springer International Publishing, Springer, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 69.66
Convert currencyQuantity: 2 available
Add to basketBuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Published by Springer International Publishing AG, Cham, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Language: English
Seller: AussieBookSeller, Truganina, VIC, Australia
First Edition
US$ 134.02
Convert currencyQuantity: 1 available
Add to basketHardcover. Condition: new. Hardcover. This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms for wired devices are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 105.87
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 126.23
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 120.79
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 133.81
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by Vieweg + Teubner Verlag, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Language: German
Seller: Revaluation Books, Exeter, United Kingdom
US$ 159.12
Convert currencyQuantity: 2 available
Add to basketHardcover. Condition: Brand New. 84 pages. German language. 9.25x6.10x9.21 inches. In Stock.
Published by Berlin Springer International Publishing Springer Apr 2018, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
US$ 64.59
Convert currencyQuantity: 2 available
Add to basketBuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. 73 pp. Englisch.