Fathi E. Abd El-Samie; Hossam Eldin H. Ahmed; Ibrahim F. Elashry; Mai H. Shahieen; Osama S. Faragallah; El-Sayed El-Rabaie Taylor & Francis Inc (2013) Kovakantinen kirja
Osama S. Faragallah; El-Sayed M. El-Rabaie; Fathi E. Abd El-Samie; Ahmed I. Sallam; Hala S. El-Sayed Apple Academic Press Inc. (2014) Kovakantinen kirja
Fathi E. Abd El-Samie; Hossam Eldin H. Ahmed; Ibrahim F. Elashry; Mai H. Shahieen; Osama S. Faragallah; El-Sayed El-Rabaie Taylor & Francis Ltd (2017) Pehmeäkantinen kirja
Taylor & Francis Inc Sivumäärä: 418 sivua Asu: Kovakantinen kirja Painos: 1 Julkaisuvuosi: 2013, 14.12.2013 (lisätietoa) Kieli: Englanti
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems.
Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations.
Complete with simulation experiments and MATLAB® codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.