Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 9,70 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Murugesan JaishreeI am M. Jaishree working as Assistant Professor at SKCT. Currently doing research in the area of Wireless communication and Networking. Completed Master degree at KCT. Undergraduate at VLBJCET.Images are often u. N° de réf. du vendeur 591663656
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26397281246
Quantité disponible : 4 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence. 60 pp. Englisch. N° de réf. du vendeur 9786139460397
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence. N° de réf. du vendeur 9786139460397
Quantité disponible : 1 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 400144385
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18397281236
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.Books on Demand GmbH, Überseering 33, 22297 Hamburg 60 pp. Englisch. N° de réf. du vendeur 9786139460397
Quantité disponible : 2 disponible(s)