Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: Books Puddle, New York, NY, U.S.A.
EUR 45,36
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New.
Editore: LAP LAMBERT Academic Publishing Apr 2022, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 43,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.Books on Demand GmbH, Überseering 33, 22297 Hamburg 60 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 35,62
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Murugesan JaishreeI am M. Jaishree working as Assistant Professor at SKCT. Currently doing research in the area of Wireless communication and Networking. Completed Master degree at KCT. Undergraduate at VLBJCET.Images are often u.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: Majestic Books, Hounslow, Regno Unito
EUR 44,41
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 46,87
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND.
Editore: LAP LAMBERT Academic Publishing Apr 2022, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 43,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence. 60 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6139460395 ISBN 13: 9786139460397
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 44,59
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.