| 000 | 04039camuu2200409 a 4500 | |
| 001 | 000045563891 | |
| 005 | 20091204171019 | |
| 008 | 031118s2005 nyua b 001 0 eng | |
| 010 | ▼a 2003066025 | |
| 016 | 7 | ▼a 969192096 ▼2 GyFmDB |
| 020 | ▼a 0387206167 (hbk. : alk. paper) | |
| 020 | ▼a 9780387206165 (hbk. : alk. paper) | |
| 035 | ▼a (OCoLC)ocm53839990 | |
| 035 | ▼a (OCoLC)53839990 | |
| 035 | ▼a (KERIS)REF000009864245 | |
| 040 | ▼a DLC ▼c DLC ▼d YDX ▼d BAKER ▼d OHX ▼d OrLoB-B ▼d UtOrBLW ▼d 211009 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a TA1630 ▼b .J38 2004 |
| 072 | 7 | ▼a TA ▼2 lcco |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b O622 | |
| 245 | 0 0 | ▼a Optical and digital techniques for information security / ▼c Bahram Javidi, editor. |
| 260 | ▼a New York : ▼b Springer, ▼c c2005. | |
| 300 | ▼a 354 p. : ▼b ill. ; ▼c 25 cm. | |
| 490 | 1 | ▼a Advanced sciences and technologies for security applications |
| 504 | ▼a Includes bibliographical references and index. | |
| 505 | 0 0 | ▼g 1. ▼t Quantum cryptography / ▼r J. D. Franson and B. C. Jacobs -- ▼g 2. ▼t New OVDs for personalized documents based on color holography and Lippman photography / ▼r Hans I. Bjelkhagen -- ▼g 3. ▼t Distortion- and noise-robust digital watermarking using input and Fourier-plane phase encoding / ▼r Sherif Kishk and Bahram Javidi -- ▼g 4. ▼t Steganography and encryption systems based on spatial correlators with meaningful output images / ▼r Joseph Rosen and Bahram Javidi -- ▼g 5. ▼t Optoelectronic information encryption with incoherent light / ▼r Enrique Tajahuerce, Jesus Lancis, Pedro Andres, Vicent Climent and Bahram Javidi -- ▼g 6. ▼t Information hiding : steganography and watermarking / ▼r Lisa M. Marvel -- ▼g 7. ▼t Watermarking streaming video : the temporal synchronization problem / ▼r Edward J. Delp and Eugene T. Lin -- ▼g 8. ▼t Secure display using encrypted digital holograms / ▼r Osamu Matoba and Bahram Javidi -- ▼g 9. ▼t Compression of digital holograms for secure three-dimensional image storage and transmission / ▼r Thomas J. Naughton and Bahram Javidi -- ▼g 10. ▼t Optical image encryption using optimized keys / ▼r Takanori Nomura and Bahram Javidi -- ▼g 11. ▼t Polarization encoding for an optical security system / ▼r Takanori Nomura and Bahram Javidi -- ▼g 12. ▼t Stream cipher using optical affine transformation / ▼r Jun Tanida and Toru Sasaki -- ▼g 13. ▼t Applications of digital holography for information security / ▼r Takanori Nomura, Enrique Tajahuerce, Osamu Matoba and Bahram Javidi -- ▼g 14. ▼t Gait-based human identification using appearance matching / ▼r A. Kale, N. Cuntoor, B. Yegnanarayana, A. N. Rajagopalan and R. Chellappa -- ▼g 15. ▼t 2-D periodic patterns for image watermarking / ▼r Damien Delannay and Benoit Macq -- ▼g 16. ▼t Image steganalysis / ▼r Rajarathnam Chandramouli and Nasir Memon -- ▼g 17. ▼t Public-key cryptography : an overview of some algorithms / ▼r Franck Leprevost. |
| 520 | 1 | ▼a "This book encompasses results of research investigation and technologies that can be used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information security issues."--BOOK JACKET. |
| 650 | 0 | ▼a Optical data processing. |
| 650 | 0 | ▼a Information storage and retrieval systems ▼x Security measures. |
| 650 | 0 | ▼a Computer security. |
| 700 | 1 | ▼a Javidi, Bahram. |
| 830 | 0 | ▼a Advanced sciences and technologies for security applications. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 O622 | 등록번호 121186453 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system?even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system?even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
New feature
Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications.
This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues.
The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of:
-Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems)
-Biological and chemical threat detection (including biosensors, aerosols, materials detection and forensics)
-Secure information systems (including encryption, and optical and photonic systems).
The series is intended to give an overview at the hightest research level at the frontier of research in the physical sciences.
정보제공 :
목차
Quantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion- and Noise-Robust Digital Watermarking Using Input and Fourier-Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for an Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of some Algorithms.
정보제공 :
