|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn868795650 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
131227t20142014fluacd ob 001 0 eng d |
010 |
|
|
|z 2013023827
|
040 |
|
|
|a UAB
|b eng
|e rda
|e pn
|c UAB
|d OCLCO
|d CDX
|d UMI
|d OCLCO
|d DEBBG
|d DEBSZ
|d YDXCP
|d GGVRL
|d OCLCQ
|d OCLCO
|d N$T
|d IDEBK
|d CUS
|d CRCPR
|d EBLCP
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d OCLCO
|d MOR
|d PIFBY
|d OTZ
|d OCLCQ
|d UAB
|d OCLCQ
|d OCLCF
|d OCLCQ
|d CEF
|d OCLCQ
|d U3W
|d UKMGB
|d WYU
|d S9I
|d YDX
|d TYFRS
|d LEAUB
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d ITD
|d UHL
|d OCLCQ
|d VT2
|d OCLCO
|d OCLCQ
|d SFB
|d INARC
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB7C1912
|2 bnb
|
016 |
7 |
|
|a 018415904
|2 Uk
|
019 |
|
|
|a 864551349
|a 865330062
|a 879683583
|a 961589659
|a 1065718615
|a 1224944746
|a 1240528102
|a 1391561239
|
020 |
|
|
|a 9781466576995
|q (e-book ;
|q PDF)
|
020 |
|
|
|a 1466576995
|q (e-book ;
|q PDF)
|
020 |
|
|
|a 1466576987
|
020 |
|
|
|a 9781466576988
|
020 |
|
|
|z 9781466576988
|
020 |
|
|
|z 9781138033924
|
024 |
7 |
|
|a 10.1201/b16309
|2 doi
|
029 |
1 |
|
|a AU@
|b 000055936316
|
029 |
1 |
|
|a DEBBG
|b BV042032437
|
029 |
1 |
|
|a DEBSZ
|b 414179056
|
029 |
1 |
|
|a DEBSZ
|b 431522383
|
029 |
1 |
|
|a DEBSZ
|b 456539522
|
029 |
1 |
|
|a GBVCP
|b 882729691
|
029 |
1 |
|
|a NZ1
|b 15342612
|
029 |
1 |
|
|a UKMGB
|b 018415904
|
029 |
1 |
|
|a AU@
|b 000068970183
|
035 |
|
|
|a (OCoLC)868795650
|z (OCoLC)864551349
|z (OCoLC)865330062
|z (OCoLC)879683583
|z (OCoLC)961589659
|z (OCoLC)1065718615
|z (OCoLC)1224944746
|z (OCoLC)1240528102
|z (OCoLC)1391561239
|
037 |
|
|
|a CL0500000426
|b Safari Books Online
|
050 |
|
4 |
|a TA1637
|b .A255 2014
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.6
|b 23
|
084 |
|
|
|a TEC015000
|a TEC061000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Abd el-Samie, Fathi E.,
|e author.
|
245 |
1 |
0 |
|a Image encryption :
|b a communication perspective /
|c Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili.
|
264 |
|
1 |
|a Boca Raton [Florida] :
|b CRC Press,
|c [2014]
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource :
|b text file, PDF
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 1. Introduction -- chapter 2. Fundamentals of image encryption -- chapter 3. Encryption evaluation metrics -- chapter 4. Homomorphic emage encryption -- chapter 5. Chaotic image encryption with different modes of operation -- chapter 6. Diffusion mechanism for data encryption in the ECB mode -- chapter 7. Orthogonal frequency division multiplexing -- chapter 8. OFDM limitations -- chapter 9. Simulation examples.
|
520 |
|
|
|a "This book covers image encryption principles as well as different encryption techniques with different purposes are covered. The image encryption topic is treated from a communication perspective. It is expected to have readers from the undergraduate and post graduate communities. This book describes, evaluates, and compares, with respect to security level and encryption speed algorithms that fall into the representative image encryption techniques, naive, position permutation, value transformation, substitution-transposition and selective techniques. It will assist application developers in selection of the encryption that best fulfills the application requirement"--
|c Provided by publisher
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Image processing
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
6 |
|a Traitement d'images
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Transmission sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Imaging Systems.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Mobile & Wireless Communications.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures
|2 fast
|
700 |
1 |
|
|a Ahmed, Hossam Eldin H.,
|e author.
|
700 |
1 |
|
|a Elashry, Ibrahim F.,
|e author.
|
700 |
1 |
|
|a Shahieen, Mai H.,
|e author.
|
700 |
1 |
|
|a Faragallah, Osama S.,
|e author.
|
700 |
1 |
|
|a El-Rabaie, El-Sayed M.,
|e author.
|
700 |
1 |
|
|a Alshebeili, Saleh A.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Abd el-Samie, Fathi E.
|t Image encryption.
|d Boca Raton, [Florida] : CRC Press, [2014]
|z 9781466576988
|w (DLC) 2013023827
|w (OCoLC)806017103
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781466576995/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25300626
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 26892720
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1438154
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 668808
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8QAN
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26892720
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429071621
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n CRC0KE21741PDF
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15915438
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10823665
|
938 |
|
|
|a Internet Archive
|b INAR
|n imageencryptionc0000abde
|
994 |
|
|
|a 92
|b IZTAP
|