Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book is devoted to the issue of image super-resolution—obtaining high-resolution images from single or multiple low-resolution images. Although there are numerous algorithms available for image interpolation and super-resolution, there’s been a need for a book that establishes a common thread between the two processes. Filling this need, Image Super-Resolution and Applications presents image interpolation as a building block in the super-resolution reconstruction process.Instead of approaching image interpolation as either a polynomial-based problem or an inverse problem, this book breaks the mold and compares and contrasts the two approaches. It presents two directions for image super-resolution: super-resolution with a priori information and blind super-resolution reconstruction of images. It also devotes chapters to the two complementary steps used to obtain high-resolution images: image registration and image fusion.Details techniques for color image interpolation and interpolation for pattern recognitionAnalyzes image interpolation as an inverse problemPresents image registration methodologies Considers image fusion and its application in image super resolutionIncludes simulation experiments along with the required MATLAB® codeSupplying complete coverage of image-super resolution and its applications, the book illustrates applications for image interpolation and super-resolution in medical and satellite image processing. It uses MATLAB® programs to present various techniques, including polynomial image interpolation and adaptive polynomial image interpolation. MATLAB codes for most of the simulation experiments supplied in the book are included in the appendix.
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches.Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems.Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations.Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.
Investigating image encryption approaches, this book examines image encryption algorithms for the purpose of wireless communication of images in secure form. It considers two directions for image encryption: permutation-based encryption and diffusion-based encryption. Covering the range of image encryption principles and techniques, it presents hybrid encryption algorithms to enhance the characteristics of traditional algorithms. It explores number theory-based encryption algorithms, details the strength of different encryption algorithms, and describes their ability to work within the limitations of wireless communication systems.
This book examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Exploring the emerging trend of cooperative communication and how it can improve the physical layer security, it considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. It also proposes a cooperative diversity protocol implementing space-time coding for an arbitrary number of relay nodes with Amplify-and-Forward (AF) protocol.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.