Normal view MARC view ISBD view

Image encryption : a communication perspective / Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen ,Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili.

By: Abd el-Samie, Fathi E.
Material type: materialTypeLabelBookPublisher: Boca Raton, [Florida] : CRC Press, Tayllor & Francis Group, [2014]Edition: Library Edition: Cryptography.Description: xiv, 404 pages : illlustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781466576988 (hardback); 9780367837747.Subject(s): Image processing -- Security measures | Data encryption (Computer science) | Wireless communication systems -- Security measures | TECHNOLOGY & ENGINEERING / Imaging Systems | TECHNOLOGY & ENGINEERING / Mobile & Wireless CommunicationsDDC classification: 006.6 Other classification: TEC015000 | TEC061000 Summary: "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
Reference Reference RGU Central Library
Reference
Reference 006.6 ABD-I (Browse shelf) Not For Loan 80135
Total holds: 0

"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"-- Provided by publisher.

Includes bibliographical references (pages 225-236) and index.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha

//