Image encryption : (Record no. 70871)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02777cam a2200421Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9780429071621 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180331t20142014fluacd ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780429071621 |
-- | (e-book : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (paperback) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.6 |
-- | A135 |
100 1# - AUTHOR NAME | |
Author | Abd el-Samie, Fathi E., |
245 10 - TITLE STATEMENT | |
Title | Image encryption : |
Sub Title | a communication perspective / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | chapter 1. Introduction -- chapter 2. Fundamentals of image encryption -- chapter 3. Encryption evaluation metrics -- chapter 4. Homomorphic emage encryption -- chapter 5. Chaotic image encryption with different modes of operation -- chapter 6. Diffusion mechanism for data encryption in the ECB mode -- chapter 7. Orthogonal frequency division multiplexing -- chapter 8. OFDM limitations -- chapter 9. Simulation examples. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement-- |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Ahmed, Hossam Eldin H., |
700 1# - AUTHOR 2 | |
Author 2 | Elashry, Ibrahim F., |
700 1# - AUTHOR 2 | |
Author 2 | Shahieen, Mai H., |
700 1# - AUTHOR 2 | |
Author 2 | Faragallah, Osama S., |
700 1# - AUTHOR 2 | |
Author 2 | El-Rabaie, El-Sayed M., |
700 1# - AUTHOR 2 | |
Author 2 | Alshebeili, Saleh A., |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781466576995 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton, [Florida] : |
-- | CRC Press, |
-- | [2014] |
264 #4 - | |
-- | ©2014 |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
520 ## - SUMMARY, ETC. | |
-- | Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Image processing |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Wireless communication systems |
No items available.