The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, penang in 1986, 2003 and 2009 respectively and currently Lecturer in School of Computer Sciences in Irbid National University, Jordan
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. 176 pp. Englisch. Codice articolo 9783846512722
Quantità: 2 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Bani Younes MohammadDr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, p. Codice articolo 5495795
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 176. Codice articolo 2698161054
Quantità: 4 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand pp. 176 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam. Codice articolo 95317569
Quantità: 4 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND pp. 176. Codice articolo 1898161044
Quantità: 4 disponibili
Da: preigu, Osnabrück, Germania
Taschenbuch. Condizione: Neu. Image Encryption Using Block-Based Transformation Algorithm | Image Encryption and Decryption Process Using Block-Based Transformation Algorithm | Mohammad Bani Younes (u. a.) | Taschenbuch | 176 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846512722 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Codice articolo 106770736
Quantità: 5 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.Books on Demand GmbH, Überseering 33, 22297 Hamburg 176 pp. Englisch. Codice articolo 9783846512722
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Codice articolo 9783846512722
Quantità: 1 disponibili
Da: Buchpark, Trebbin, Germania
Condizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Codice articolo 11244999/2
Quantità: 1 disponibili
Da: Mispah books, Redhill, SURRE, Regno Unito
Paperback. Condizione: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Codice articolo ERICA79638465127296
Quantità: 1 disponibili