Normal view MARC view ISBD view

Image encryption : a communication perspective / Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili.

By: Abd el-Samie, Fathi E [author.].
Contributor(s): Ahmed, Hossam Eldin H [author.] | Elashry, Ibrahim F [author.] | Shahieen, Mai H [author.] | Faragallah, Osama S [author.] | El-Rabaie, El-Sayed M [author.] | Alshebeili, Saleh A [author.].
Material type: materialTypeLabelBookPublisher: Boca Raton, [Florida] : CRC Press, [2014]Copyright date: ©2014Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780429071621.Subject(s): Image processing -- Security measures | Data encryption (Computer science) | Wireless communication systems -- Security measuresAdditional physical formats: Print version: : No titleDDC classification: 006.6 Online resources: Click here to view.
Contents:
chapter 1. Introduction -- chapter 2. Fundamentals of image encryption -- chapter 3. Encryption evaluation metrics -- chapter 4. Homomorphic emage encryption -- chapter 5. Chaotic image encryption with different modes of operation -- chapter 6. Diffusion mechanism for data encryption in the ECB mode -- chapter 7. Orthogonal frequency division multiplexing -- chapter 8. OFDM limitations -- chapter 9. Simulation examples.
Summary: This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement-- Provided by publisher.
    average rating: 0.0 (0 votes)
No physical items for this record

chapter 1. Introduction -- chapter 2. Fundamentals of image encryption -- chapter 3. Encryption evaluation metrics -- chapter 4. Homomorphic emage encryption -- chapter 5. Chaotic image encryption with different modes of operation -- chapter 6. Diffusion mechanism for data encryption in the ECB mode -- chapter 7. Orthogonal frequency division multiplexing -- chapter 8. OFDM limitations -- chapter 9. Simulation examples.

This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement-- Provided by publisher.

There are no comments for this item.

Log in to your account to post a comment.