000 | 02777cam a2200421Ii 4500 | ||
---|---|---|---|
001 | 9780429071621 | ||
008 | 180331t20142014fluacd ob 001 0 eng d | ||
020 |
_a9780429071621 _q(e-book : PDF) |
||
020 |
_z9781466576988 _q(hardback) |
||
020 |
_z9781138033924 _q(paperback) |
||
024 | 7 |
_a10.1201/b16309 _2doi |
|
035 | _a(OCoLC)864551349 | ||
040 |
_aFlBoTFG _cFlBoTFG _erda |
||
050 | 4 |
_aTA1637 _b.A255 2014 |
|
082 | 0 | 4 |
_a006.6 _bA135 |
100 | 1 |
_aAbd el-Samie, Fathi E., _eauthor. _915072 |
|
245 | 1 | 0 |
_aImage encryption : _ba communication perspective / _cFathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili. |
264 | 1 |
_aBoca Raton, [Florida] : _bCRC Press, _c[2014] |
|
264 | 4 | _c©2014 | |
300 | _a1 online resource | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
505 | 0 | _achapter 1. Introduction -- chapter 2. Fundamentals of image encryption -- chapter 3. Encryption evaluation metrics -- chapter 4. Homomorphic emage encryption -- chapter 5. Chaotic image encryption with different modes of operation -- chapter 6. Diffusion mechanism for data encryption in the ECB mode -- chapter 7. Orthogonal frequency division multiplexing -- chapter 8. OFDM limitations -- chapter 9. Simulation examples. | |
520 |
_aThis book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement-- _cProvided by publisher. |
||
650 | 0 |
_aImage processing _xSecurity measures. _915073 |
|
650 | 0 |
_aData encryption (Computer science) _99168 |
|
650 | 0 |
_aWireless communication systems _xSecurity measures. _96257 |
|
700 | 1 |
_aAhmed, Hossam Eldin H., _eauthor. _915074 |
|
700 | 1 |
_aElashry, Ibrahim F., _eauthor. _915075 |
|
700 | 1 |
_aShahieen, Mai H., _eauthor. _915076 |
|
700 | 1 |
_aFaragallah, Osama S., _eauthor. _915077 |
|
700 | 1 |
_aEl-Rabaie, El-Sayed M., _eauthor. _915078 |
|
700 | 1 |
_aAlshebeili, Saleh A., _eauthor. _915079 |
|
776 | 0 | 8 |
_iPrint version: _z9781466576988 _w(DLC) 2013023827 |
856 | 4 | 0 |
_uhttps://www.taylorfrancis.com/books/9781466576995 _zClick here to view. |
942 | _cEBK | ||
999 |
_c70871 _d70871 |