Embedded multimedia security systems : (Record no. 254)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04984cam a22003857a 4500 |
001 - CONTROL NUMBER | |
control field | 17444914 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20191211114556.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120829s2013 enka b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2012948199 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781447159186 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)ocn820899634 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | AU@ |
Language of cataloging | eng |
Transcribing agency | KCST |
Modifying agency | OCLCO |
042 ## - AUTHENTICATION CODE | |
Authentication code | lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK7895.E42 |
Item number | P363 2013 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 006.7 |
Edition number | 23 |
Item number | Pa Em |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pande, Amit. |
9 (RLIN) | 890 |
245 10 - TITLE STATEMENT | |
Title | Embedded multimedia security systems : |
Remainder of title | algorithms and architectures / |
Statement of responsibility, etc. | Amit Pande, Joseph Zambreno. |
246 14 - VARYING FORM OF TITLE | |
Title proper/short title | Embedded systems for smart appliances and energy management |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | London ; |
-- | New York : |
Name of publisher, distributor, etc. | Springer, |
Date of publication, distribution, etc. | c2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 146 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: pt. I Multimedia Systems -- 1.Introduction -- 1.1.Video Coding -- 1.2.Embedded Systems and Reconfigurable Architectures -- 1.3.Encryption Basics -- 2.Advances in Multimedia Encryption -- 2.1.Introduction -- 2.2.Multimedia Encryption Problem -- 2.3.Common Approaches to Video Encryption -- 2.3.1.Scrambling -- 2.3.2.Post-compression Encryption Algorithm -- 2.3.3.Pre-compression Encryption Algorithm -- 2.3.4.Selective Encryption -- 2.3.5.Joint Video Compression and Encryption (JVCE) Approaches -- 2.3.6.Future of JVCE Schemes -- References -- 3.Securing Multimedia Content Using Joint Compression and Encryption -- 3.1.Introduction -- 3.2.Basics -- 3.3.Our Approach -- References -- pt. II Examples -- 4.Polymorphic Wavelet Transform -- 4.1.Introduction -- 4.2.Motivation and Insight -- 4.2.1.Daubechies 9/7-Tap Bi-orthogonal Filter -- 4.2.2.Le Gall's 5/3 Filter -- 4.3.Background and Related Work -- 4.3.1.Wavelet Transform Background -- |
Formatted contents note | Contents note continued: 4.3.2.Hardware Implementation of DWT -- 4.4.Poly-DWT Filter -- 4.4.1.Parameterized Filter Design -- 4.4.2.Numerical Study -- 4.4.3.Candidate Filters -- 4.4.4.Hardware Architectures -- 4.5.Fixed Point Implementation -- 4.6.Hardware (Re)-allocation -- 4.6.1.'On-the-Fly' Switching -- 4.6.2.'Bit-Width' Switching -- 4.7.Experiments -- 4.7.1.Image Reconstruction Quality -- 4.7.2.Hardware vs. Software Performance -- 4.7.3.Hardware Comparison -- 4.7.4.Dynamic Bit Allocation -- 4.7.5.Real-World Application -- 4.8.Conclusions and Future Work -- References -- 5.The Secure Wavelet Transform -- 5.1.Introduction -- 5.2.Preliminaries -- 5.2.1.Parameterized Construction of DWT -- 5.2.2.Subband Re-orientation -- 5.3.Security -- 5.4.Hardware Implementation -- 5.4.1.Reconfigurable Constant Multiplier (RCM) -- 5.4.2.Implementation Results -- 5.5.Parameterized Lifting -- 5.6.Conclusion and Future Work -- References -- 6.Chaotic Filter Banks -- 6.1.Introduction -- |
Formatted contents note | Contents note continued: 6.1.1.Chaos and Cryptography -- 6.1.2.Wavelets and Chaotic Filter Banks -- 6.1.3.Scope and Organization -- 6.1.4.Reconfigurable Hardware Implementation of DWT -- 6.2.Chaotic Filter Bank Scheme -- 6.2.1.Chaotic Maps -- 6.2.2.Key Space -- 6.3.The MCFB Scheme -- 6.4.Improved Chaotic Oscillator -- 6.4.1.The Modified Logistic Map (MLM) -- 6.5.Wavelet Parameterization -- 6.6.Resistance of Chaotic Generator Against Cryptanalysis -- 6.6.1.Randomness Tests -- 6.6.2.Bifurcation Map -- 6.6.3.Lyapunov Exponent -- 6.7.Security Enhancement -- 6.8.Hardware Implementation -- 6.8.1.Hardware Optimizations for ICO -- 6.9.Conclusions -- References -- 7.Chaotic Arithmetic Coding -- 7.1.Introduction -- 7.1.1.Weakness of SAC Coder -- 7.2.Arithmetic Coding with Piece-wise Linear Chaotic Maps -- 7.2.1.Compression Efficiency -- 7.2.2.Binary Chaotic Arithmetic Coding (BCAC) -- 7.2.3.Implementation Efficiency -- 7.3.Security -- 7.3.1.Application to Multimedia/Data Encryption -- |
Formatted contents note | Contents note continued: 7.3.2.Threat Model -- 7.3.3.Security Enhancements (SE) -- 7.3.4.Resistance to Known Attacks -- 7.3.5.Comparison with BAC+AES -- 7.3.6.Key and Plaintext Sensitivity -- 7.3.7.Selective Encryption Using BCAC -- 7.4.Compression -- 7.5.Hardware Implementation -- 7.5.1.Literature Review -- 7.5.2.Implementation Details -- 7.5.3.Binary Arithmetic Coder (BAC) Architecture -- 7.5.4.Binary Chaotic Arithmetic Coder and Encryption (BCAC) Architecture -- 7.5.5.Cost of Encryption -- 7.5.6.N-ary Chaotic Arithmetic Coder and Encryption (NCAC) Coding -- 7.5.7.Multiple Symbol per Cycle Arithmetic Coding -- 7.6.Related Work -- 7.6.1.Multiple Huffman Tables -- 7.6.2.Randomized Arithmetic Coding -- 7.6.3.Secure Arithmetic Coding -- 7.7.Conclusion -- References -- 8.Conclusion. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Embedded computer systems |
General subdivision | Security measures. |
9 (RLIN) | 891 |
Topical term or geographic name entry element | Computer security. |
9 (RLIN) | 892 |
Topical term or geographic name entry element | Multimedia systems |
General subdivision | Security measures. |
9 (RLIN) | 893 |
Topical term or geographic name entry element | Data encryption (Computer science) |
9 (RLIN) | 894 |
Topical term or geographic name entry element | Embedded computer systems |
General subdivision | Design and construction. |
9 (RLIN) | 895 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zambreno, Joseph. |
9 (RLIN) | 896 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Date acquired | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
KCST Library | KCST Library | 2019-12-11 | 006.7 Pa Em | 1000000687 | 2020-02-11 | 2019-12-11 | Book |