Image from Google Jackets

Image encryption : a communication perspective / Fathi E. Abd El-Samie ...[et. al.]

By: El-Samie, Fathi E. AbdMaterial type: TextTextPublication details: New York CRC Press c 2014 Description: xiv, 404 pages : illlustrations ; 24 cmISBN: 9781466576988 (hardback)Subject(s): Computer science | Image processing -- Security measures | Data encryption (Computer science) | Wireless communication systems -- Security measures | TECHNOLOGY & ENGINEERING / Imaging Systems | TECHNOLOGY & ENGINEERING / Mobile & Wireless CommunicationsDDC classification: 006.6 Summary: "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
REFERENCE Malaviya National Institute of Technology
Reference
006.6 ELS (Browse shelf(Opens below)) Not for loan 87396

Includes bibliographical references (pages 225-236) and index.

"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--

There are no comments on this title.

to post a comment.