The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.
"synopsis" may belong to another edition of this title.
Dr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, penang in 1986, 2003 and 2009 respectively and currently Lecturer in School of Computer Sciences in Irbid National University, Jordan
"About this title" may belong to another edition of this title.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. 176 pp. Englisch. Seller Inventory # 9783846512722
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 176. Seller Inventory # 2698161054
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Bani Younes MohammadDr. Mohammad Ali Bani Younes received BSc in Computer Science from Yarmouk University in Irbid Jordan, MSc from Sudan University of science and Technology, PhD in computer science from Universiti Sains Malaysia, p. Seller Inventory # 5495795
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 176 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam. Seller Inventory # 95317569
Quantity: 4 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 176. Seller Inventory # 1898161044
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Image Encryption Using Block-Based Transformation Algorithm | Image Encryption and Decryption Process Using Block-Based Transformation Algorithm | Mohammad Bani Younes (u. a.) | Taschenbuch | 176 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846512722 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Seller Inventory # 106770736
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms.Books on Demand GmbH, Überseering 33, 22297 Hamburg 176 pp. Englisch. Seller Inventory # 9783846512722
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Seller Inventory # 9783846512722
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | The subject of security has been around for a long time. Encryption is used to securely transmit data in open networks. A strong algorithm has been used for image security, this algorithm has added a sizable contribution to the field of data security and in particular, image security. This technique has the advantage of saving space by using the hiding efficiency method. Another benefit of this technique is its generality; it can be applied with any other algorithm to enhance its performance. This book opened a new window on digital images; their formats, processing and security as well as it provided a lot of knowledge about the encryption/decryption and steganography techniques and how to protect them from unauthorized access. The commonly used algorithms in industry and literature have been provided and how can use them in the encryption and decryption processes. Furthermore, the security measurement added a good knowledge and actual experience for users who want to distinguish between the properties of the available algorithms. This enabled users to quantify the differences between the different encryption/decryption algorithms. Seller Inventory # 11244999/2
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Seller Inventory # ERICA79638465127296
Quantity: 1 available