Image encryption : a communication perspective / Fathi E. Abd El-Samie ...[et. al.]
Material type: TextPublication details: New York CRC Press c 2014 Description: xiv, 404 pages : illlustrations ; 24 cmISBN: 9781466576988 (hardback)Subject(s): Computer science | Image processing -- Security measures | Data encryption (Computer science) | Wireless communication systems -- Security measures | TECHNOLOGY & ENGINEERING / Imaging Systems | TECHNOLOGY & ENGINEERING / Mobile & Wireless CommunicationsDDC classification: 006.6 Summary: "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
REFERENCE | Malaviya National Institute of Technology Reference | 006.6 ELS (Browse shelf(Opens below)) | Not for loan | 87396 |
Includes bibliographical references (pages 225-236) and index.
"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naïve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--
There are no comments on this title.