000 03505nam a22005415i 4500
001 978-3-030-20816-5
003 DE-He213
005 20220801214709.0
007 cr nn 008mamaa
008 190611s2019 sz | s |||| 0|eng d
020 _a9783030208165
_9978-3-030-20816-5
024 7 _a10.1007/978-3-030-20816-5
_2doi
050 4 _aTK5103.2-.4885
072 7 _aTJKW
_2bicssc
072 7 _aTEC061000
_2bisacsh
072 7 _aTJKW
_2thema
082 0 4 _a621.384
_223
100 1 _aShankar, K.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_939899
245 1 0 _aSecure Image Transmission in Wireless Sensor Network (WSN) Applications
_h[electronic resource] /
_cby K. Shankar, Mohamed Elhoseny.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aX, 161 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v564
505 0 _aIntroduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks.
520 _aThis book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a “must-read” guide to the subject matter.
650 0 _aWireless communication systems.
_93474
650 0 _aMobile communication systems.
_94051
650 0 _aComputational intelligence.
_97716
650 1 4 _aWireless and Mobile Communication.
_939900
650 2 4 _aComputational Intelligence.
_97716
700 1 _aElhoseny, Mohamed.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_939901
710 2 _aSpringerLink (Online service)
_939902
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030208158
776 0 8 _iPrinted edition:
_z9783030208172
776 0 8 _iPrinted edition:
_z9783030208189
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v564
_939903
856 4 0 _uhttps://doi.org/10.1007/978-3-030-20816-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76646
_d76646