CRC Press, 2014. — 406 p.We try in this book to look at image encryption with the eyes of communication researchers. Traditional studies of encryption concentrate on the strength of the encryption algorithm without taking into consideration what is after encryption. What is after encryption is the question we must answer to select the appropriate encryption algorithm. For real-life applications, what is after encryption is communication of encrypted images. With the advances in mobile and TV applications, we have to transmit encrypted images wirelessly. So, “Do our encryption algorithms tolerate the wireless communication impairments?” is the question we are trying to answer in this book. We can summarize the main contributions in this book as follows: This book is devoted to the issue of image encryption for the purpose of wireless communications. Diffusion as well as permutation ciphers are considered in this book, with a comparison between them using different evaluation metrics. Modifications are presented to existing block ciphers either to speed up or to enhance their performance. The wireless communication environment in which the encrypted images needs to be communicated is studied. Simulation experiments are presented for the validation of the discussed algorithms and their modifications and for investigating the performance of algorithms over wireless channels. MATLAB codes for most of the simulation experiments in this book are included in two appendices at the end of the book.Introduction Fundamentals of Image Encryption Encryption Evaluation Metrics Homomorphic Image Encryption Chaotic Image Encryption with Different Modes of Operation Diffusion Mechanism for Data Encryption in the ECB Mode Orthogonal Frequency Division Multiplexing OFDM Limitations Simulation Examples
Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.