000 03310nam a22005895i 4500
001 978-981-13-2523-6
003 DE-He213
005 20220801214321.0
007 cr nn 008mamaa
008 180901s2019 si | s |||| 0|eng d
020 _a9789811325236
_9978-981-13-2523-6
024 7 _a10.1007/978-981-13-2523-6
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aZhang, Yushu.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_937646
245 1 0 _aSecure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
_h[electronic resource] /
_cby Yushu Zhang, Yong Xiang, Leo Yu Zhang.
250 _a1st ed. 2019.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2019.
300 _aXII, 115 p. 45 illus., 29 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Signal Processing,
_x2196-4084
505 0 _aIntroduction -- Secure Compressive Sensing -- Multimedia Data Security -- Cloud Computing Security -- Internet of Things Security -- Concluding Remarks and Future Research.
520 _aThis book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
650 0 _aSignal processing.
_94052
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
700 1 _aXiang, Yong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_937647
700 1 _aZhang, Leo Yu.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_937648
710 2 _aSpringerLink (Online service)
_937649
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811325229
776 0 8 _iPrinted edition:
_z9789811325243
830 0 _aSpringerBriefs in Signal Processing,
_x2196-4084
_937650
856 4 0 _uhttps://doi.org/10.1007/978-981-13-2523-6
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76211
_d76211