<p>Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
โ Scribed by Yushu Zhang, Yong Xiang, Leo Yu Zhang
- Publisher
- Springer Singapore
- Year
- 2019
- Tongue
- English
- Leaves
- 124
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
โฆ Table of Contents
Front Matter ....Pages i-xii
Compressive Sensing (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 1-9
Secure Compressive Sensing (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 11-14
Multimedia Data Security (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 15-62
Cloud Computing Security (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 63-82
Internet of Things Security (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 83-112
Concluding Remarks and Future Research (Yushu Zhang, Yong Xiang, Leo Yu Zhang)....Pages 113-115
โฆ Subjects
Engineering; Signal, Image and Speech Processing; Systems and Data Security; Data Encryption
๐ SIMILAR VOLUMES
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.</div>
<p><span>Cloud computing, the Internet of Things (IoT), and big data are three significant technological trends affecting the world's largest corporations. This book discusses big data, cloud computing, and the IoT, with a focus on the benefits and implementation problems. In addition, it examines t
<p>This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a networ
<p>This book plays a significant role in improvising human life to a great extent. The new applications of soft computing can be regarded as an emerging field in computer science, automatic control engineering, medicine, biology application, natural environmental engineering, and pattern recognition
This thesis contributes to the fields of data compression and compressed sensing and their application to imaging mass spectrometry and sporadic communication. Compressed sensing is mainly built on the knowledge that most data is compressible or sparse, meaning that most of its content is redundant