42,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This book addresses the problem of copyright protection in open network environments. Author module embeds the CUN and distributor PIN in the image. In this module, FSP algorithm is used to generate public and private keys. CS module embeds the Buyer's PIN into the image using CS private key. Hash value of the image is computed using hashing algorithm. It helps for authentication purpose. In buyer module, hash value of the received image is computed using hash function. Buyer confirmation phase is used for authentication purpose.CA module detects illegal usage. Image file is transferred via…mehr

Produktbeschreibung
This book addresses the problem of copyright protection in open network environments. Author module embeds the CUN and distributor PIN in the image. In this module, FSP algorithm is used to generate public and private keys. CS module embeds the Buyer's PIN into the image using CS private key. Hash value of the image is computed using hashing algorithm. It helps for authentication purpose. In buyer module, hash value of the received image is computed using hash function. Buyer confirmation phase is used for authentication purpose.CA module detects illegal usage. Image file is transferred via LAN or email. In this book the FSP encryption/ decryption algorithm is based on the flipping, substitution and permutation operations. It is fast and fairly secure. However, it is only suitable for applications that do not expose the inputs and the encrypted form of the inputs to the public.
Autorenporträt
Dr.C.Parthasarathy has been working as a Assistant Professor in Information Technology in Sri Chandrashekhendra Saraswathi Viswa Maha Vidyalaya University, Enathur, Kanchipuram -631561 since 2006. He has completed his M.C.A from Madras University, and he hold on M.Tech (IT) from Sathyabama University.