Atjaunināt sīkdatņu piekrišanu

E-grāmata: Optical and Digital Techniques for Information Security

Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system—even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e ective security systems.

Recenzijas

From the reviews of the first edition:









"This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate object and information from theft, counterfeiting, and manipulation . This book is unique because it has diverse contributions from the field of optics . It has compiled recent critical breakthroughs from academic and industrial research of the leaders in the field. This work is a perfect survey of the fast developing field and should not be missed in any library." (Jörg Stettler, Optik, Vol. 117, 2006)

Quantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion- and Noise-Robust Digital Watermarking Using Input and Fourier-Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for an Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of some Algorithms.