MARC details
| 000 -LEADER |
| fixed length control field |
05477cam a22004937i 4500 |
| 001 - CONTROL NUMBER |
| control field |
17444914 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20190509133952.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120829s2013 enka b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2012948199 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781447144588 (alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1447144589 (alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781447144595 (ebk.) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocn820899634 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
AU@ |
| Language of cataloging |
eng |
| Transcribing agency |
AU@ |
| Modifying agency |
OCLCO |
| -- |
CDX |
| -- |
BTCTA |
| -- |
YDXCP |
| -- |
BWX |
| -- |
CFI |
| -- |
IXA |
| -- |
DLC |
| Description conventions |
rda |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK7895.E42 |
| Item number |
P363 2013 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
006.7 |
| Edition number |
23 |
| Item number |
P.A.E |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Pande, Amit, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Embedded multimedia security systems : |
| Remainder of title |
algorithms and architectures / |
| Statement of responsibility, etc |
Amit Pande, Joseph Zambreno. |
| 246 14 - VARYING FORM OF TITLE |
| Title proper/short title |
Embedded systems for smart appliances and energy management |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
London ; |
| -- |
New York : |
| Name of publisher, distributor, etc |
Springer, |
| Date of publication, distribution, etc |
c2013. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvii, 146 pages : |
| Other physical details |
illustrtation ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2015 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Machine generated contents note: pt. I Multimedia Systems -- 1.Introduction -- 1.1.Video Coding -- 1.2.Embedded Systems and Reconfigurable Architectures -- 1.3.Encryption Basics -- 2.Advances in Multimedia Encryption -- 2.1.Introduction -- 2.2.Multimedia Encryption Problem -- 2.3.Common Approaches to Video Encryption -- 2.3.1.Scrambling -- 2.3.2.Post-compression Encryption Algorithm -- 2.3.3.Pre-compression Encryption Algorithm -- 2.3.4.Selective Encryption -- 2.3.5.Joint Video Compression and Encryption (JVCE) Approaches -- 2.3.6.Future of JVCE Schemes -- References -- 3.Securing Multimedia Content Using Joint Compression and Encryption -- 3.1.Introduction -- 3.2.Basics -- 3.3.Our Approach -- References -- pt. II Examples -- 4.Polymorphic Wavelet Transform -- 4.1.Introduction -- 4.2.Motivation and Insight -- 4.2.1.Daubechies 9/7-Tap Bi-orthogonal Filter -- 4.2.2.Le Gall's 5/3 Filter -- 4.3.Background and Related Work -- 4.3.1.Wavelet Transform Background -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Contents note continued: 4.3.2.Hardware Implementation of DWT -- 4.4.Poly-DWT Filter -- 4.4.1.Parameterized Filter Design -- 4.4.2.Numerical Study -- 4.4.3.Candidate Filters -- 4.4.4.Hardware Architectures -- 4.5.Fixed Point Implementation -- 4.6.Hardware (Re)-allocation -- 4.6.1.'On-the-Fly' Switching -- 4.6.2.'Bit-Width' Switching -- 4.7.Experiments -- 4.7.1.Image Reconstruction Quality -- 4.7.2.Hardware vs. Software Performance -- 4.7.3.Hardware Comparison -- 4.7.4.Dynamic Bit Allocation -- 4.7.5.Real-World Application -- 4.8.Conclusions and Future Work -- References -- 5.The Secure Wavelet Transform -- 5.1.Introduction -- 5.2.Preliminaries -- 5.2.1.Parameterized Construction of DWT -- 5.2.2.Subband Re-orientation -- 5.3.Security -- 5.4.Hardware Implementation -- 5.4.1.Reconfigurable Constant Multiplier (RCM) -- 5.4.2.Implementation Results -- 5.5.Parameterized Lifting -- 5.6.Conclusion and Future Work -- References -- 6.Chaotic Filter Banks -- 6.1.Introduction -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Contents note continued: 6.1.1.Chaos and Cryptography -- 6.1.2.Wavelets and Chaotic Filter Banks -- 6.1.3.Scope and Organization -- 6.1.4.Reconfigurable Hardware Implementation of DWT -- 6.2.Chaotic Filter Bank Scheme -- 6.2.1.Chaotic Maps -- 6.2.2.Key Space -- 6.3.The MCFB Scheme -- 6.4.Improved Chaotic Oscillator -- 6.4.1.The Modified Logistic Map (MLM) -- 6.5.Wavelet Parameterization -- 6.6.Resistance of Chaotic Generator Against Cryptanalysis -- 6.6.1.Randomness Tests -- 6.6.2.Bifurcation Map -- 6.6.3.Lyapunov Exponent -- 6.7.Security Enhancement -- 6.8.Hardware Implementation -- 6.8.1.Hardware Optimizations for ICO -- 6.9.Conclusions -- References -- 7.Chaotic Arithmetic Coding -- 7.1.Introduction -- 7.1.1.Weakness of SAC Coder -- 7.2.Arithmetic Coding with Piece-wise Linear Chaotic Maps -- 7.2.1.Compression Efficiency -- 7.2.2.Binary Chaotic Arithmetic Coding (BCAC) -- 7.2.3.Implementation Efficiency -- 7.3.Security -- 7.3.1.Application to Multimedia/Data Encryption -- |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Contents note continued: 7.3.2.Threat Model -- 7.3.3.Security Enhancements (SE) -- 7.3.4.Resistance to Known Attacks -- 7.3.5.Comparison with BAC+AES -- 7.3.6.Key and Plaintext Sensitivity -- 7.3.7.Selective Encryption Using BCAC -- 7.4.Compression -- 7.5.Hardware Implementation -- 7.5.1.Literature Review -- 7.5.2.Implementation Details -- 7.5.3.Binary Arithmetic Coder (BAC) Architecture -- 7.5.4.Binary Chaotic Arithmetic Coder and Encryption (BCAC) Architecture -- 7.5.5.Cost of Encryption -- 7.5.6.N-ary Chaotic Arithmetic Coder and Encryption (NCAC) Coding -- 7.5.7.Multiple Symbol per Cycle Arithmetic Coding -- 7.6.Related Work -- 7.6.1.Multiple Huffman Tables -- 7.6.2.Randomized Arithmetic Coding -- 7.6.3.Secure Arithmetic Coding -- 7.7.Conclusion -- References -- 8.Conclusion. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Embedded computer systems |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Multimedia systems |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data encryption (Computer science) |
| 9 (RLIN) |
16940 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Embedded computer systems |
| General subdivision |
Design and construction. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Zambreno, Joseph, |
| Relator term |
co-author. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Abstract |
| Uniform Resource Identifier |
<a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3606">http://repository.fue.edu.eg/xmlui/handle/123456789/3606</a> |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
epcn |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |