000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190527b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789811322785 |
Terms of availability |
(pbk) |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.3822 |
Item number |
TES |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Testa, Matteo |
245 ## - TITLE STATEMENT |
Title |
Compressed sensing for privacy-preserving data processing |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Singapore : |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2019 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 91 p. : |
Other physical details |
ill. ; |
Dimensions |
23.3 cm. |
365 ## - TRADE PRICE |
Price type code |
EUR |
Price amount |
54.99 |
Unit of pricing |
00 |
490 ## - SERIES STATEMENT |
Series statement |
SpringerBriefs in electrical and computer engineering, Signal processing |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references |
520 ## - SUMMARY, ETC. |
Summary, etc |
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data structures |
|
Topical term or geographic name as entry element |
Privacy & data protection |
|
Topical term or geographic name as entry element |
Calculus of variations |
|
Topical term or geographic name as entry element |
Imaging systems & technology |
|
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Mathematical optimization |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Valsesia, Diego |
Relator term |
aut |
|
Personal name |
Bianchi, Tiziano |
Relator term |
aut |
|
Personal name |
Magli, Enrico |
Relator term |
aut |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |