Зарегистрироваться
Восстановить пароль
FAQ по входу

El-Samie F.E.A., Ahmed H.E.H., Elashry I.F., Shahieen M.H., Faragallah O.S., El-Rabaie E.-S.M., Alshebeili S.A. Image Encryption. A Communication Perspective

  • Файл формата pdf
  • размером 5,65 МБ
  • Добавлен пользователем
  • Отредактирован
El-Samie F.E.A., Ahmed H.E.H., Elashry I.F., Shahieen M.H., Faragallah O.S., El-Rabaie E.-S.M., Alshebeili S.A. Image Encryption. A Communication Perspective
CRC Press, 2014. — 406 p.
We try in this book to look at image encryption with the eyes of communication researchers. Traditional studies of encryption concentrate on the strength of the encryption algorithm without taking into consideration what is after encryption. What is after encryption is the question we must answer to select the appropriate encryption algorithm. For real-life applications, what is after encryption is communication of encrypted images. With the advances in mobile and TV applications, we have to transmit encrypted images wirelessly. So, “Do our encryption algorithms tolerate the wireless communication impairments?” is the question we are trying to answer in this book.
We can summarize the main contributions in this book as follows: This book is devoted to the issue of image encryption for the purpose of wireless communications. Diffusion as well as permutation ciphers are considered in this book, with a comparison between them using different evaluation metrics. Modifications are presented to existing block ciphers either to speed up or to enhance their performance. The wireless communication environment in which the encrypted images needs to be communicated is studied. Simulation experiments are presented for the validation of the discussed algorithms and their modifications and for investigating the performance of algorithms over wireless channels. MATLAB codes for most of the simulation experiments in this book are included in two appendices at the end of the book.
Introduction
Fundamentals of Image Encryption
Encryption Evaluation Metrics
Homomorphic Image Encryption
Chaotic Image Encryption with Different Modes of Operation
Diffusion Mechanism for Data Encryption in the ECB Mode
Orthogonal Frequency Division Multiplexing
OFDM Limitations
Simulation Examples
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация