Noise Tolerant Data Authentication for Wireless Communication (eBook)
XI, 73 Seiten
Springer International Publishing (Verlag)
978-3-319-78942-2 (ISBN)
- Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;
- Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;
- Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Obaid Ur-Rehman is a post-doctoral fellow at the chair for data communications systems of the University of Siegen in Germany. He received his M.Sc. degree in 2004 in Computer Engineering from the Faculty of Electrical Engineering at the University of Engineering and Technology, Taxila, Pakistan and his Dr.-Ing. degree in 2012 from the Chair for Data Communications Systems at the University of Siegen, Germany. During his doctoral research he worked on soft decoding techniques for error correcting codes and their applications in various fields, such as data and image authentication in the presence of noise and over wireless communication channels. Dr.-Ing. Ur-Rehman currently works as a scientific researcher at the Chair for Data Communications Systems at the University of Siegen, Germany. He is involved in various research projects funded by industry and the European Union. He has more than 10 years of industrial and academic experience. He is actively participating in conferences and has given tutorials at various international conferences. He also serves as a reviewer for various international journals and has authored more than 30 scientific research publications in international journals and conferences.Natasa Zivic is an Associated Professor and a Private Docent at the University of Siegen. She works as a lecturer at the University of Siegen since 2007, teaching Basics of Communication Techniques, Digital Communications Technologies I and Digital Communications Technologies II. She received Dipl.- Ing. degree (1999) and a Magister degree (2002) from the Faculty of Electrical Engineering at the University of Belgrade, Serbia. She started her research at the Chair for Data Communications Systems at the University of Siegen, Germany in October 2004. She received Dr.-Ing. Degree from the University Siegen, Faculty for Electrical and Computer Engineering in 2007 and continued her work as a lecturer and as a postdoctoral candidate. She defended her Postdoctoral Degree (Habilitation) in area of Electrical Engineering and Telecommunications from the University Siegen in 2012. Her actual areas of interest are connection between cryptography and standard communication techniques like channel coding, and applying of cryptography in communications, especially in noisy environments. She published about 100 journal and conference papers, 2 monographs and 3 patents (2 in Germany and 1 in USA). She works as a member of the German national body in ISO and as a project editor of security standards. She served as a TPC member and an organizer of several IEEE conferences/workshops and as a technical reviewer of several IEEE and other journals. She is a member of IEEE and IEEE Communication Society.
Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.
Erscheint lt. Verlag | 31.3.2018 |
---|---|
Reihe/Serie | Signals and Communication Technology | Signals and Communication Technology |
Zusatzinfo | XI, 73 p. 36 illus., 10 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Grafik / Design |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Content based image authentication • feature extraction • image authentication • Noise Tolerant Authentication • Soft Authentication • Wireless Channels • Wireless Communications Systems |
ISBN-10 | 3-319-78942-2 / 3319789422 |
ISBN-13 | 978-3-319-78942-2 / 9783319789422 |
Haben Sie eine Frage zum Produkt? |
Größe: 2,7 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich