The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, penang in 1986, 2003 and 2009 respectively and currently Lecturer in School of Computer Sciences in Irbid National University, Jordan
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. 176 pp. Englisch. Bestandsnummer des Verkäufers 9783846512722
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Bani Younes MohammadDr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, p. Bestandsnummer des Verkäufers 5495795
Anzahl: Mehr als 20 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 176. Bestandsnummer des Verkäufers 2698161054
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand pp. 176 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam. Bestandsnummer des Verkäufers 95317569
Anzahl: 4 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 176. Bestandsnummer des Verkäufers 1898161044
Anzahl: 4 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Image Encryption Using Block-Based Transformation Algorithm | Image Encryption and Decryption Process Using Block-Based Transformation Algorithm | Mohammad Bani Younes (u. a.) | Taschenbuch | 176 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846512722 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Bestandsnummer des Verkäufers 106770736
Anzahl: 5 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.Books on Demand GmbH, Überseering 33, 22297 Hamburg 176 pp. Englisch. Bestandsnummer des Verkäufers 9783846512722
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Bestandsnummer des Verkäufers 9783846512722
Anzahl: 1 verfügbar
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Bestandsnummer des Verkäufers 11244999/2
Anzahl: 1 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
Paperback. Zustand: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Bestandsnummer des Verkäufers ERICA79638465127296
Anzahl: 1 verfügbar