|
" Foundations of coding : "
Jean-Guillaume Dumas, Jean-Louis Roch, Eric Tannier, Sebastien Varrette
Document Type
|
:
|
BL
|
Record Number
|
:
|
641179
|
Doc. No
|
:
|
dltt
|
Main Entry
|
:
|
Dumas, Jean-Guillaume.
|
Title & Author
|
:
|
Foundations of coding : : compression, encryption, errorcorrection /\ Jean-Guillaume Dumas, Jean-Louis Roch, Eric Tannier, Sebastien Varrette
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
9781118960868
|
|
:
|
: 1118960866
|
|
:
|
: 9781118960523
|
|
:
|
: 1118960521
|
|
:
|
: 9781119005940
|
|
:
|
: 1119005949
|
|
:
|
: 1118881443
|
|
:
|
: 9781118881446
|
|
:
|
9781118881446
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index
|
Contents
|
:
|
Foundations of Coding -- From Julius Caesar to Telecopy -- The Source: from an Image to a Sequence of Pixels -- Message Compression -- Error Detection -- Encryption -- Decryption -- Drawbacks of the Fax Code -- Orders of Magnitude and Complexity Bounds for Algorithms -- Stream Ciphers and Probabilities -- The Vernam Cipher and the One-Time-Pad Cryptosystem -- Some Probability -- Entropy -- Steganography and Watermarking -- Perfect Secrecy -- Perfect Secrecy in Practice and Kerckhoffs' Principles -- Block Ciphers, Algebra, and Arithmetic -- Blocks and Chaining Modes from CBC to CTR -- Algebraic Structure of Codewords -- Bijective Encoding of a Block -- Construction of Prime Fields and Finite Fields -- Implementation of Finite Fields -- Curves Over Finite Fields -- Pseudo-Random Number Generators (PRNG) -- Decoding, Decryption. Attacks -- Decoding without Ambiguity -- Noninjective Codes -- Cryptanalysis -- Information Theory and Compression -- Information Theory -- Average Length of a Code -- Entropy as a Measure of the Amount of Information -- Shannon's Theorem -- Statistical Encoding -- Huffman's Algorithm -- Arithmetic Encoding -- Adaptive Codes -- Heuristics of Entropy Reduction -- Run-Length Encoding (RLE) -- Move-to-Front -- Burrows-Wheeler Transform (BWT) -- Common Compression Codes -- Lempel-Ziv's Algorithm and gzip Variants -- Comparisons of Compression Algorithms -- GIF and PNG Formats for Image Compression -- Lossy Compression -- Deterioration of Information -- Transformation of Audiovisual Information -- JPEG Format -- Motion Picture Experts Group (MPEG) Format -- Cryptology -- General Principles -- Terminology -- What is the Use of Cryptography? -- Main Types of Threats -- Secret Key Cryptography -- Principle of Symmetric Cryptography -- Classes of Symmetric Encryption Schemes -- Data Encryption Standard (DES) System -- Rijndael: Advanced Encryption Standard (AES) -- Key Exchange -- Diffie-Hellman Protocol and Man-in-the-Middle Attacks -- Kerberos: a Secret Key Provider -- Public Key Cryptography -- Motivations and Main Principles -- Rivest-Sharnir-Adleman (RSA) Encryption -- El Gamal Encryption -- Authentication, Integrity, Nonrepudiation. Signatures -- Cryptographic Hash Functions -- Public Key Authentication -- Electronic Signatures -- Key Management -- Generation of Cryptographically Secure Bits -- Public Key Infrastructure (PKI) -- Securing Channels with the SSH Tool -- Error Detection and Correction -- Principle of Error Detection and Error Correction -- Block Coding -- A Simple Example of Parity Detection -- Correction Using Longitudinal and Transverse Parity -- Encoding, Decoding, and Probability of Error -- Shannon's Second Theorem -- Error Detection by Parity - CRC Codes -- Parity Check on Integers: ISBN, EAN, LUHN -- Cyclic Redundancy Checks (CRC) -- Distance of a Code -- Error Correction Code and Hamming Distance -- Equivalent Codes, Extended Codes, and Shortened Codes -- Perfect Codes -- Binary Hamming Codes -- Linear Codes and Cyclic Codes -- Linear Codes and Minimum Redundancy -- Encoding and Decoding of Linear Codes -- Low Density Parity Check (LDPC) Codes -- Cyclic Codes -- Bose-Chaudhuri-Hocquenghem (BCH) Codes -- Optimal BCH Codes: Reed-Solomon Codes -- Bursts of Errors and Interleaving -- Packets of Errors -- Interleaving -- Interleaving with Delay and Interleaving Table -- Cross-Interleaved codes -- Convolutionl Codes and Turbo Codes -- Encoding by Convolution -- Shortest Path Decoding -- Turbo Codes
|
Abstract
|
:
|
"This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension." --
|
Subject
|
:
|
Coding theory.
|
Dewey Classification
|
:
|
003/.54
|
LC Classification
|
:
|
TK5102.92
|
Added Entry
|
:
|
Roch, Jean-Louis, (Mathematician)
|
|
:
|
Tannier, Eric.
|
|
:
|
Varrette, Sébastien.
|
Added Entry
|
:
|
Ohio Library and Information Network.
|
| |