Amazon cover image
Image from Amazon.com

Progress in data encryption research / Camel Tanougast, Ph.D., editor .

Contributor(s): Material type: TextTextSeries: Computer science, technology and applications | Cryptography, steganography and data securityPublisher: New York : Nova Publishers, [2013]Copyright date: ©2013Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781629482590
  • 1629482595
Subject(s): Genre/Form: Additional physical formats: Print version:: Progress in data encryption researchDDC classification:
  • 005.8/2 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Ch. 1 Image Encryption Scheme Based on Continous-Time Chaotic Systems / I. N. Stouboulos -- ch. 2 Hyperchaos-Based True Random Number Generator for Data Stream Encryption / Abbas Dandache -- ch. 3 Robust Image Encryption Based on a Synchronized Hybrid Discrete Continuous Chaotic System / Cedric Killian -- ch. 4 Hyperchaotic Synchronization and Encryption for Secure Data Wireless Communication / Camel Tanougast -- ch. 5 Strategy for Memory-Storage Encryption-Authentication / Fang Liu -- ch. 6 Selective Encryption of Images and Videos: From JPEG to H.265/HEVC through JPEG2000 and H.264/AVC / William Puech -- ch. 7 Protecting Digital Media Using Perceptual Hashing / Ahmed Bouridane.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes bibliographical references (pages 223-226) and index.

Description based on print version record and CIP data provided by publisher.

Ch. 1 Image Encryption Scheme Based on Continous-Time Chaotic Systems / I. N. Stouboulos -- ch. 2 Hyperchaos-Based True Random Number Generator for Data Stream Encryption / Abbas Dandache -- ch. 3 Robust Image Encryption Based on a Synchronized Hybrid Discrete Continuous Chaotic System / Cedric Killian -- ch. 4 Hyperchaotic Synchronization and Encryption for Secure Data Wireless Communication / Camel Tanougast -- ch. 5 Strategy for Memory-Storage Encryption-Authentication / Fang Liu -- ch. 6 Selective Encryption of Images and Videos: From JPEG to H.265/HEVC through JPEG2000 and H.264/AVC / William Puech -- ch. 7 Protecting Digital Media Using Perceptual Hashing / Ahmed Bouridane.

Master record variable field(s) change: 050, 082

Powered by Koha