Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.
Features & Benefits:
* Incorporates both data encryption and data hiding
* Supplies a wealth of exercises and solutions to help readers readily understand the material
* Presents...
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is...
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area.
"Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for...
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi...
Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book examines a wide array of current methods used in creating real-looking objects in the computer, one of the main aims of computer graphics.
Key features:
* Good foundational mathematical introduction to curves and surfaces; no advanced math required
* Topics organized by different interpolation/approximation techniques, each technique providing useful information about curves and surfaces
* Exposition motivated by...
Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book exami...
In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him. Braille himself modified his code in 1834, and there have been several modifications since. However, the basic design of this code, where each character is represented by a group of 3 x 2 dots, has remained intact. The dots are embossed on thick paper and each can be raised or flat (i. e., present or absent). Each dot is therefore equivalent to one bit of information. As a result, the Braille code (Figure...
In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today a...
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader s knowledge - answers...
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is i...
It is probably a coincidence that the three main terms discussed in this book, namely transformations, projections, and perspective, are ambiguous. Here is what the dict- nary has to say about these terms. Transformation (a) The act or an instance of transforming. (b) The state of being transformed. A marked change, as in appearance or character, usually for the better. Mathematical transformation. (a) Replacing a variable in an expression by its value. (b) Mapping a mathematical space onto another or onto itself. In geometry. Moving, rotating, re?ecting, or otherwise systematically deforming...
It is probably a coincidence that the three main terms discussed in this book, namely transformations, projections, and perspective, are ambiguous. He...
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties and these can be useful. This book brings this large set of codes to the attention of workers in the field and for students of computer science. The author s crystal clear style of writing and presentation allows easy access to the topic."
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less...
This clearly written book offers readers a succinct foundation to the most important topics in the field of data compression. Part I presents the basic approaches to data compression and describes a few popular techniques and methods that are commonly used to compress data. The reader will discover essential concepts. Part II concentrates on advanced techniques, such as arithmetic coding, orthogonal transforms, subband transforms and Burrows-Wheeler transform. This book is the perfect reference for advanced undergraduates in computer science and requires a minimum of mathematics. An...
This clearly written book offers readers a succinct foundation to the most important topics in the field of data compression. Part I presents the b...
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. Detailed descriptions and explanations of the most well-known and frequently used compression...
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to imag...
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area.
"Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for...
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi...