26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

In recent years, steganography domain has attracted considerable research interest. The effective and popular means of privacy protection is to encrypt the ordinary data into unintelligible data, so as traditional data processing for privacy usually takes place before encryption or after decryption. In some cases, content owner does not trust the processing of service provider, when to manipulate encrypted data keeping the plain content unrevealed is desired. For instance, when the secret data to be transmitted is encrypted, a channel provider without any knowledge of the cryptographic key may…mehr

Produktbeschreibung
In recent years, steganography domain has attracted considerable research interest. The effective and popular means of privacy protection is to encrypt the ordinary data into unintelligible data, so as traditional data processing for privacy usually takes place before encryption or after decryption. In some cases, content owner does not trust the processing of service provider, when to manipulate encrypted data keeping the plain content unrevealed is desired. For instance, when the secret data to be transmitted is encrypted, a channel provider without any knowledge of the cryptographic key may tend to compress the encrypted data due to the limited channel resource. So the given approach in the book overcomes the shortfalls in the existing techniques.
Autorenporträt
Mr. Yogesh M. Kamble is working as an Asst. Professor in Computer Sci. & Engg. Dept. of DKTE'S Textile at Engineering Institute Ichalkaranji. Mr. Krishna S. Kadam is working as an Asst. Professor in Computer Sci. & Engg. Dept. of DKTE'S Textile at Engineering Institute Ichalkaranji.