Abd el-Samie, Fathi E.
Image encryption : a communication perspective / Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen ,Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili. - Library Edition: Cryptography - xiv, 404 pages : illlustrations ; 24 cm
Includes bibliographical references (pages 225-236) and index.
"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--
9781466576988 (hardback) 9780367837747
2013023827
Image processing--Security measures.
Data encryption (Computer science)
Wireless communication systems--Security measures.
TECHNOLOGY & ENGINEERING / Imaging Systems.
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications.
TA1637 / .A255 2014
006.6 / ABD-I
Image encryption : a communication perspective / Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen ,Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili. - Library Edition: Cryptography - xiv, 404 pages : illlustrations ; 24 cm
Includes bibliographical references (pages 225-236) and index.
"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--
9781466576988 (hardback) 9780367837747
2013023827
Image processing--Security measures.
Data encryption (Computer science)
Wireless communication systems--Security measures.
TECHNOLOGY & ENGINEERING / Imaging Systems.
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications.
TA1637 / .A255 2014
006.6 / ABD-I