Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure Compressive Sensing in Multim...
~
Zhang, Leo Yu.
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT/ by Yushu Zhang, Yong Xiang, Leo Yu Zhang.
Author:
Zhang, Yushu.
other author:
Xiang, Yong.
Description:
XII, 115 p. 45 illus., 29 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Signal processing. -
Online resource:
https://doi.org/10.1007/978-981-13-2523-6
ISBN:
9789811325236
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
Zhang, Yushu.
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
[electronic resource] /by Yushu Zhang, Yong Xiang, Leo Yu Zhang. - 1st ed. 2019. - XII, 115 p. 45 illus., 29 illus. in color.online resource. - SpringerBriefs in Signal Processing,2196-4076. - SpringerBriefs in Signal Processing,.
Introduction -- Secure Compressive Sensing -- Multimedia Data Security -- Cloud Computing Security -- Internet of Things Security -- Concluding Remarks and Future Research.
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
ISBN: 9789811325236
Standard No.: 10.1007/978-981-13-2523-6doiSubjects--Topical Terms:
561459
Signal processing.
LC Class. No.: TK5102.9
Dewey Class. No.: 621.382
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
LDR
:02530nam a22004215i 4500
001
1009071
003
DE-He213
005
20200705172858.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811325236
$9
978-981-13-2523-6
024
7
$a
10.1007/978-981-13-2523-6
$2
doi
035
$a
978-981-13-2523-6
050
4
$a
TK5102.9
050
4
$a
TA1637-1638
072
7
$a
TTBM
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TTBM
$2
thema
072
7
$a
UYS
$2
thema
082
0 4
$a
621.382
$2
23
100
1
$a
Zhang, Yushu.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1302960
245
1 0
$a
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
$h
[electronic resource] /
$c
by Yushu Zhang, Yong Xiang, Leo Yu Zhang.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 115 p. 45 illus., 29 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Signal Processing,
$x
2196-4076
505
0
$a
Introduction -- Secure Compressive Sensing -- Multimedia Data Security -- Cloud Computing Security -- Internet of Things Security -- Concluding Remarks and Future Research.
520
$a
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
650
0
$a
Signal processing.
$3
561459
650
0
$a
Image processing.
$3
557495
650
0
$a
Speech processing systems.
$3
564428
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
1 4
$a
Signal, Image and Speech Processing.
$3
670837
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
700
1
$a
Xiang, Yong.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1062830
700
1
$a
Zhang, Leo Yu.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1302961
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811325229
776
0 8
$i
Printed edition:
$z
9789811325243
830
0
$a
SpringerBriefs in Signal Processing,
$x
2196-4076
$3
1257405
856
4 0
$u
https://doi.org/10.1007/978-981-13-2523-6
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login