Image encryption: a communication perspective
"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book de...
Gespeichert in:
Beteiligte Personen: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton [Florida]
CRC Press
[2014]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781466576995/?ar |
Zusammenfassung: | "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"-- |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource text file, PDF |
ISBN: | 9781466576995 1466576995 1466576987 9781466576988 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-05889540X | ||
003 | DE-627-1 | ||
005 | 20240228115437.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781466576995 |c e-book ; |9 978-1-4665-7699-5 | ||
020 | |a 1466576995 |c e-book ; |9 1-4665-7699-5 | ||
020 | |a 1466576987 |9 1-4665-7698-7 | ||
020 | |a 9781466576988 |9 978-1-4665-7698-8 | ||
035 | |a (DE-627-1)05889540X | ||
035 | |a (DE-599)KEP05889540X | ||
035 | |a (ORHE)9781466576995 | ||
035 | |a (DE-627-1)05889540X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 006.6 | |
100 | 1 | |a Abd el-Samie, Fathi E. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Image encryption |b a communication perspective |c Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili |
264 | 1 | |a Boca Raton [Florida] |b CRC Press |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource |b text file, PDF | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"-- | ||
650 | 0 | |a Image processing |x Security measures | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Traitement d'images ; Sécurité ; Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Transmission sans fil ; Sécurité ; Mesures | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Imaging Systems | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications | |
650 | 4 | |a COMPUTERS ; General | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Wireless communication systems ; Security measures | |
700 | 1 | |a Ahmed, Hossam Eldin H. |e VerfasserIn |4 aut | |
700 | 1 | |a Elashry, Ibrahim F. |e VerfasserIn |4 aut | |
700 | 1 | |a Shahieen, Mai H. |e VerfasserIn |4 aut | |
700 | 1 | |a Faragallah, Osama S. |e VerfasserIn |4 aut | |
700 | 1 | |a El-Rabaie, El-Sayed M. |e VerfasserIn |4 aut | |
700 | 1 | |a Alshebeili, Saleh A. |e VerfasserIn |4 aut | |
776 | 1 | |z 9781466576988 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781466576988 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781466576995/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-05889540X |
---|---|
_version_ | 1821494837155725313 |
adam_text | |
any_adam_object | |
author | Abd el-Samie, Fathi E. Ahmed, Hossam Eldin H. Elashry, Ibrahim F. Shahieen, Mai H. Faragallah, Osama S. El-Rabaie, El-Sayed M. Alshebeili, Saleh A. |
author_facet | Abd el-Samie, Fathi E. Ahmed, Hossam Eldin H. Elashry, Ibrahim F. Shahieen, Mai H. Faragallah, Osama S. El-Rabaie, El-Sayed M. Alshebeili, Saleh A. |
author_role | aut aut aut aut aut aut aut |
author_sort | Abd el-Samie, Fathi E. |
author_variant | e s f e a esfe esfea h e h a heh heha i f e if ife m h s mh mhs o s f os osf e s m e r esme esmer s a a sa saa |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)05889540X (DE-599)KEP05889540X (ORHE)9781466576995 |
dewey-full | 006.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.6 |
dewey-search | 006.6 |
dewey-sort | 16.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-05889540X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115437.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466576995</subfield><subfield code="c">e-book ;</subfield><subfield code="9">978-1-4665-7699-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466576995</subfield><subfield code="c">e-book ;</subfield><subfield code="9">1-4665-7699-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466576987</subfield><subfield code="9">1-4665-7698-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466576988</subfield><subfield code="9">978-1-4665-7698-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05889540X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP05889540X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466576995</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05889540X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.6</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Abd el-Samie, Fathi E.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Image encryption</subfield><subfield code="b">a communication perspective</subfield><subfield code="c">Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [Florida]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">text file, PDF</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Image processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Traitement d'images ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Imaging Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmed, Hossam Eldin H.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Elashry, Ibrahim F.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shahieen, Mai H.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Faragallah, Osama S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">El-Rabaie, El-Sayed M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alshebeili, Saleh A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466576988</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466576988</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466576995/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-05889540X |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:43Z |
institution | BVB |
isbn | 9781466576995 1466576995 1466576987 9781466576988 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource text file, PDF |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press |
record_format | marc |
spelling | Abd el-Samie, Fathi E. VerfasserIn aut Image encryption a communication perspective Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili Boca Raton [Florida] CRC Press [2014] ©2014 1 Online-Ressource text file, PDF Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"-- Image processing Security measures Data encryption (Computer science) Wireless communication systems Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Imaging Systems TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications COMPUTERS ; General Wireless communication systems ; Security measures Ahmed, Hossam Eldin H. VerfasserIn aut Elashry, Ibrahim F. VerfasserIn aut Shahieen, Mai H. VerfasserIn aut Faragallah, Osama S. VerfasserIn aut El-Rabaie, El-Sayed M. VerfasserIn aut Alshebeili, Saleh A. VerfasserIn aut 9781466576988 Erscheint auch als Druck-Ausgabe 9781466576988 |
spellingShingle | Abd el-Samie, Fathi E. Ahmed, Hossam Eldin H. Elashry, Ibrahim F. Shahieen, Mai H. Faragallah, Osama S. El-Rabaie, El-Sayed M. Alshebeili, Saleh A. Image encryption a communication perspective Image processing Security measures Data encryption (Computer science) Wireless communication systems Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Imaging Systems TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications COMPUTERS ; General Wireless communication systems ; Security measures |
title | Image encryption a communication perspective |
title_auth | Image encryption a communication perspective |
title_exact_search | Image encryption a communication perspective |
title_full | Image encryption a communication perspective Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili |
title_fullStr | Image encryption a communication perspective Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili |
title_full_unstemmed | Image encryption a communication perspective Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili |
title_short | Image encryption |
title_sort | image encryption a communication perspective |
title_sub | a communication perspective |
topic | Image processing Security measures Data encryption (Computer science) Wireless communication systems Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Imaging Systems TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications COMPUTERS ; General Wireless communication systems ; Security measures |
topic_facet | Image processing Security measures Data encryption (Computer science) Wireless communication systems Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Transmission sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Imaging Systems TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications COMPUTERS ; General Wireless communication systems ; Security measures |
work_keys_str_mv | AT abdelsamiefathie imageencryptionacommunicationperspective AT ahmedhossameldinh imageencryptionacommunicationperspective AT elashryibrahimf imageencryptionacommunicationperspective AT shahieenmaih imageencryptionacommunicationperspective AT faragallahosamas imageencryptionacommunicationperspective AT elrabaieelsayedm imageencryptionacommunicationperspective AT alshebeilisaleha imageencryptionacommunicationperspective |