000891388 000__ 03018cam\a2200445Ii\4500 000891388 001__ 891388 000891388 005__ 20230306150044.0 000891388 006__ m\\\\\o\\d\\\\\\\\ 000891388 007__ cr\cn\nnnunnun 000891388 008__ 190613s2019\\\\sz\\\\\\o\\\\\000\0\eng\d 000891388 020__ $$a9783030208165$$q(electronic book) 000891388 020__ $$a3030208168$$q(electronic book) 000891388 020__ $$z9783030208158 000891388 035__ $$aSP(OCoLC)on1104346067 000891388 035__ $$aSP(OCoLC)1104346067 000891388 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dEBLCP$$dLQU$$dGW5XE$$dOCLCF$$dUKMGB 000891388 049__ $$aISEA 000891388 050_4 $$aTK5105.2 000891388 08204 $$a621.380414$$223 000891388 1001_ $$aShankar, K.,$$eauthor. 000891388 24510 $$aSecure image transmission in Wireless Sensor Network (WSN) applications /$$cK. Shankar and Mohamed Elhoseny. 000891388 264_1 $$aCham :$$bSpringer,$$c2019. 000891388 300__ $$a1 online resource. 000891388 336__ $$atext$$btxt$$2rdacontent 000891388 337__ $$acomputer$$bc$$2rdamedia 000891388 338__ $$aonline resource$$bcr$$2rdacarrier 000891388 4901_ $$aLecture notes in electrical engineering ;$$v564 000891388 5050_ $$aIntroduction -- An Optimal Light Weight Cryptography -- SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks. 000891388 506__ $$aAccess limited to authorized users. 000891388 520__ $$aThis book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter. 000891388 588__ $$aOnline resource; title from PDF title page (viewed June 13, 2019) 000891388 650_0 $$aImage transmission. 000891388 650_0 $$aImaging systems. 000891388 650_0 $$aWireless LANs$$xSecurity measures. 000891388 7001_ $$aElhoseny, Mohamed,$$eauthor. 000891388 830_0 $$aLecture notes in electrical engineering ;$$vv. 564. 000891388 852__ $$bebk 000891388 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-20816-5$$zOnline Access$$91397441.1 000891388 909CO $$ooai:library.usi.edu:891388$$pGLOBAL_SET 000891388 980__ $$aEBOOK 000891388 980__ $$aBIB 000891388 982__ $$aEbook 000891388 983__ $$aOnline 000891388 994__ $$a92$$bISE