Book Description
Topic covered
The topic of this book is the automatic transmission of numerical information. We focus on the structure of information, without regarding the type of transmission support. Information can be of any kind as long as we can give a numerical representation of it: for example texts, images, sounds, videos. Transmission of this type of data is ubiquitous in technology, especially in telecommunications. Hence, it is necessary to rely on solid foundations for that transmission to be reliable. In this context, we explain how to structure the information so that its transmission is safe, error-free, efficient and fast.
Origin
The book is based on the translation of a French version published by Dunod which knew several successive editions. The English translation has been realized jointly by a French and an English native speakers. The French version itself was initiated in spring 2000 with the creation of the joint ENSIMAG-ENSERG Telecommunication department at the Grenoble Institute of Technology (INPG - France) and the setting up of a general course (Master level in the Bachelor-Master-PhD scheme), thus providing an introduction to codes and their applications. Compared to the French book, this one has been revised and significantly augmented (20% additional pages and 27 new exercises). We now cover frequently used techniques, as elliptic curves, Low density parity codes or matrix barcodes. In addition, we have updated several parts, including steganography and watermarking, Maximum Likelihood decoding, Galois hashing and counter mode, OAEP, saturation attacks (on AES, the Advanced Encryption Standard), post-quantum cryptography. Eventually we emphasized the description of the organization, contents and objectives of each chapter and section in their introductions.
It can be used as a reference book by teachers, researchers or companies involved in telecommunication or information security, such that the information it now contains will be still relevant for the coming years as it was the case until now.
Originality
The originality’s of this book are to give a unified point of view on several mathematical and computational domains related to the transmission of information, and to combine a rigorous presentation and daily-life applicability. We emphasize on algorithmic aspects, so that all structures and methods can be efficiently implemented and follow the latest advances in the industry.
With respect to the French edition we propose 27 new exercises (for a total of 147, all provided with a detailed correction as appendix) and we now cover further recent advances like elliptic curve cryptography, QR codes, LDPC codes, Horner scheme, GHASH, Galois counter mode, Steganography and watermarking, AES square attack …
On each of the three subjects compression, cryptology and error-correction, there exists excellent textbooks. The originality of our text is to present a rigorous and unified theory for all three together with practical applications for everyday life. An added value of this textbook is to provide alternatively course material and corrected exercises. It is therefore particularly adapted to the education or the instruction of domain security, cryptology or information transmission experts.
The most important reader benefits from the proposed book are:
- The book is intended to be a reference book for by teachers, researchers or companies involved in telecommunication or information security.
- The reader will get a unified point of view on several mathematical and computational domains related to the transmission of information, combined in a rigorous presentation yet with daily-life applicability.
- The book will provide the reader with 147 exercises, all proposed at different level of complexity to better explain or complete the described concepts and algorithms.
- All exercises are provided with a detailed correction at the end of the book such that the reader can refer to it at will without sacrificing the readability of each chapter.
- The book is self-contained, i.e. all used concepts are introduced.
- The reader will find a complete and up-to-date survey on topics covering the automatic transmission of numerical information in a safe, error-free, efficient and fast way
Target Audience
The presented work is aimed at providing a textbook for master students in applied mathematics or computer science. It can be used as a reference book by teachers, researchers or companies involved in telecommunication or information security. The book is, to a certain extent, self-contained, i.e. all used concepts are introduced. However some training in algebra, algorithms and probability theory will be helpful. Moreover, it alternates the presentation of concepts and 147 exercises with corrections. It is therefore particularly adapted to the education or the instruction of domain security, cryptology or information transmission experts.