The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.
"Sinopsis" puede pertenecer a otra edición de este libro.
The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.
Dr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, penang in 1986, 2003 and 2009 respectively and currently Lecturer in School of Computer Sciences in Irbid National University, Jordan
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. 176 pp. Englisch. Nº de ref. del artículo: 9783846512722
Cantidad disponible: 2 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Bani Younes MohammadDr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, p. Nº de ref. del artículo: 5495795
Cantidad disponible: Más de 20 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. pp. 176. Nº de ref. del artículo: 2698161054
Cantidad disponible: 4 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Print on Demand pp. 176 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam. Nº de ref. del artículo: 95317569
Cantidad disponible: 4 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. PRINT ON DEMAND pp. 176. Nº de ref. del artículo: 1898161044
Cantidad disponible: 4 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. Image Encryption Using Block-Based Transformation Algorithm | Image Encryption and Decryption Process Using Block-Based Transformation Algorithm | Mohammad Bani Younes (u. a.) | Taschenbuch | 176 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846512722 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Nº de ref. del artículo: 106770736
Cantidad disponible: 5 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.Books on Demand GmbH, Überseering 33, 22297 Hamburg 176 pp. Englisch. Nº de ref. del artículo: 9783846512722
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Nº de ref. del artículo: 9783846512722
Cantidad disponible: 1 disponibles
Librería: Buchpark, Trebbin, Alemania
Condición: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Nº de ref. del artículo: 11244999/2
Cantidad disponible: 1 disponibles
Librería: Mispah books, Redhill, SURRE, Reino Unido
Paperback. Condición: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Nº de ref. del artículo: ERICA79638465127296
Cantidad disponible: 1 disponibles