Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Biometrics Wireless Communication
Details
This book has come up with a solution of "Sending highly sensitive information and it should be only known to the receiver, it requires remote authentication". The remote authentication is the process which involves the securing the information to be send with encryption added with the video or audio cues. Nevertheless, Trojan horse and other attacks can cause serious problems. The three main process carried out in this books are semantic segmentation, secure or encryption and finally data hiding. The mentioned processes are an identical algorithm, which does semantic segmentation- segmenting a sample video into head and body as frame. Secure force algorithm receiver biometrics is encrypted by this algorithm. Data hiding embedding the information to be sent to the receiver in the selected frame of signal or Image of the video. Finally, the Inverse Discrete Wavelet Transform (IDWT) is applied to provide the data to the receiver from Stego-Object (SO). Which methods is used to detect the biometric signal in to wireless communication.
Autorentext
Dr. N. Muthu Kumaran wurde 1984 in Kaniyakumari, Tamilnadu, Indien, geboren. Er erwarb den Bachelor-, Master- und Doktortitel an der Anna University in Chennai, Indien. Derzeit arbeitet er als Professor an der Anna University und ist als Forschungsleiter für die Betreuung von Doktoranden und das Forschungslabor des Francis Xavier Engineering College in Tamilnadu, Indien, anerkannt.
Klappentext
This book has come up with a solution of "Sending highly sensitive information and it should be only known to the receiver, it requires remote authentication". The remote authentication is the process which involves the securing the information to be send with encryption added with the video or audio cues. Nevertheless, Trojan horse and other attacks can cause serious problems. The three main process carried out in this books are semantic segmentation, secure or encryption and finally data hiding. The mentioned processes are an identical algorithm, which does semantic segmentation- segmenting a sample video into head and body as frame. Secure force algorithm receiver biometrics is encrypted by this algorithm. Data hiding embedding the information to be sent to the receiver in the selected frame of signal or Image of the video. Finally, the Inverse Discrete Wavelet Transform (IDWT) is applied to provide the data to the receiver from Stego-Object (SO). Which methods is used to detect the biometric signal in to wireless communication.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09786200569462
- Genre Elektrotechnik
- Sprache Englisch
- Anzahl Seiten 68
- Größe H220mm x B150mm x T5mm
- Jahr 2020
- EAN 9786200569462
- Format Kartonierter Einband
- ISBN 6200569460
- Veröffentlichung 03.03.2020
- Titel Biometrics Wireless Communication
- Autor N. Muthu Kumaran
- Gewicht 119g
- Herausgeber LAP LAMBERT Academic Publishing