32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
16 °P sammeln
  • Broschiertes Buch

Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms…mehr

Produktbeschreibung
Images are often used in various processes. Therefore, the security of image data due to unauthorized use is important. Image encryption plays an important role in the field of information hiding. The image encryption process made the information unreadable. Therefore, hackers and eavesdroppers, including server administrators, cannot access the original message or other types of information sent over public networks such as the Internet. The reverse process of image encryption is called the image decryption process. The decrypted image must be in its original format. Chaos-based algorithms typically require a set of characters, called keys, in both the encrypted and decrypted processes. In chaos-based algorithms, the keys are very sensitive and need to generate a random sequence.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Eu sou M. Jaishree a trabalhar como Professor Assistente no SKCT. Actualmente a fazer investigação na área da comunicação e redes sem fios. Mestrado completo no KCT. Licenciatura na VLBJCET.