It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 02467cam 2200373 i 4500
001 9925174853701661
005 20150423154405.0
008 130624s2014 flua b 001 0 eng
010 $a 2013023827
019 $a861648298
020 $a9781466576988
020 $a1466576987 (hardback)
035 $a(OCoLC)806017103$z(OCoLC)861648298
035 $b99959626138
035 $a(OCoLC)ocn806017103
040 $aDLC$beng$erda$cDLC$dBTCTA$dYDXCP$dLYU$dWAU$dDAY$dUKMGB$dOCLCO$dCHVBK$dUWW
042 $apcc
050 00 $aTA1637$b.A255 2014
082 00 $a006.6$223
100 1 $aAbd el-Samie, Fathi E.
245 10 $aImage encryption :$ba communication perspective /$cFathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen ,Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili.
264 1 $aBoca Raton, [Florida] :$bCRC Press, Tayllor & Francis Group,$c[2014]
300 $axiv, 404 pages :$billlustrations ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references (pages 225-236) and index.
505 00 $tIntroduction --$tFundamentals of image encryption --$tEncryption evaluation metrics --$tHomomorphic image encryption --$tChaotic image encryption with different modes of operation --$tDiffusion mechanism for date encryption in the ECB mode --$tOrthogonal frequency division multiplexing --$tOFDM limitations --$tSimulation examples.
520 $a"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, nai ve, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--$cProvided by publisher.
650 0 $aImage processing$xSecurity measures.
650 0 $aData encryption (Computer science)
650 0 $aWireless communication systems$xSecurity measures.
947 $fBOOK-SETC$g119.95$hCIRCSTACKS$iaa/sf$lNULS$o20140822$q1
980 $a99959626138