000 | 03310nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-13-2523-6 | ||
003 | DE-He213 | ||
005 | 20220801214321.0 | ||
007 | cr nn 008mamaa | ||
008 | 180901s2019 si | s |||| 0|eng d | ||
020 |
_a9789811325236 _9978-981-13-2523-6 |
||
024 | 7 |
_a10.1007/978-981-13-2523-6 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aZhang, Yushu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _937646 |
|
245 | 1 | 0 |
_aSecure Compressive Sensing in Multimedia Data, Cloud Computing and IoT _h[electronic resource] / _cby Yushu Zhang, Yong Xiang, Leo Yu Zhang. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2019. |
|
300 |
_aXII, 115 p. 45 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Signal Processing, _x2196-4084 |
|
505 | 0 | _aIntroduction -- Secure Compressive Sensing -- Multimedia Data Security -- Cloud Computing Security -- Internet of Things Security -- Concluding Remarks and Future Research. | |
520 | _aThis book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aXiang, Yong. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _937647 |
|
700 | 1 |
_aZhang, Leo Yu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _937648 |
|
710 | 2 |
_aSpringerLink (Online service) _937649 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811325229 |
776 | 0 | 8 |
_iPrinted edition: _z9789811325243 |
830 | 0 |
_aSpringerBriefs in Signal Processing, _x2196-4084 _937650 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-13-2523-6 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c76211 _d76211 |