Image Encryption

Book description


Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches.Covering the spectrum of image encry

Table of contents

  1. Front Cover
  2. Contents
  3. Preface
  4. About the Authors
  5. Chapter 1: Introduction
  6. Chapter 2: Fundamentals of Image Encryption (1/6)
  7. Chapter 2: Fundamentals of Image Encryption (2/6)
  8. Chapter 2: Fundamentals of Image Encryption (3/6)
  9. Chapter 2: Fundamentals of Image Encryption (4/6)
  10. Chapter 2: Fundamentals of Image Encryption (5/6)
  11. Chapter 2: Fundamentals of Image Encryption (6/6)
  12. Chapter 3: Encryption Evaluation Metrics (1/2)
  13. Chapter 3: Encryption Evaluation Metrics (2/2)
  14. Chapter 4: Homomorphic Image Encryption (1/3)
  15. Chapter 4: Homomorphic Image Encryption (2/3)
  16. Chapter 4: Homomorphic Image Encryption (3/3)
  17. Chapter 5: Chaotic Image Encryption with Different Modes of Operation (1/3)
  18. Chapter 5: Chaotic Image Encryption with Different Modes of Operation (2/3)
  19. Chapter 5: Chaotic Image Encryption with Different Modes of Operation (3/3)
  20. Chapter 6: Diffusion Mechanism for Data Encryption in the ECB Mode (1/4)
  21. Chapter 6: Diffusion Mechanism for Data Encryption in the ECB Mode (2/4)
  22. Chapter 6: Diffusion Mechanism for Data Encryption in the ECB Mode (3/4)
  23. Chapter 6: Diffusion Mechanism for Data Encryption in the ECB Mode (4/4)
  24. Chapter 7: Orthogonal Frequency Division Multiplexing (1/3)
  25. Chapter 7: Orthogonal Frequency Division Multiplexing (2/3)
  26. Chapter 7: Orthogonal Frequency Division Multiplexing (3/3)
  27. Chapter 8: OFDM Limitations (1/6)
  28. Chapter 8: OFDM Limitations (2/6)
  29. Chapter 8: OFDM Limitations (3/6)
  30. Chapter 8: OFDM Limitations (4/6)
  31. Chapter 8: OFDM Limitations (5/6)
  32. Chapter 8: OFDM Limitations (6/6)
  33. Chapter 9: Simulation Examples (1/19)
  34. Chapter 9: Simulation Examples (2/19)
  35. Chapter 9: Simulation Examples (3/19)
  36. Chapter 9: Simulation Examples (4/19)
  37. Chapter 9: Simulation Examples (5/19)
  38. Chapter 9: Simulation Examples (6/19)
  39. Chapter 9: Simulation Examples (7/19)
  40. Chapter 9: Simulation Examples (8/19)
  41. Chapter 9: Simulation Examples (9/19)
  42. Chapter 9: Simulation Examples (10/19)
  43. Chapter 9: Simulation Examples (11/19)
  44. Chapter 9: Simulation Examples (12/19)
  45. Chapter 9: Simulation Examples (13/19)
  46. Chapter 9: Simulation Examples (14/19)
  47. Chapter 9: Simulation Examples (15/19)
  48. Chapter 9: Simulation Examples (16/19)
  49. Chapter 9: Simulation Examples (17/19)
  50. Chapter 9: Simulation Examples (18/19)
  51. Chapter 9: Simulation Examples (19/19)
  52. References (1/3)
  53. References (2/3)
  54. References (3/3)
  55. Appendix A (1/12)
  56. Appendix A (2/12)
  57. Appendix A (3/12)
  58. Appendix A (4/12)
  59. Appendix A (5/12)
  60. Appendix A (6/12)
  61. Appendix A (7/12)
  62. Appendix A (8/12)
  63. Appendix A (9/12)
  64. Appendix A (10/12)
  65. Appendix A (11/12)
  66. Appendix A (12/12)
  67. Appendix B (1/20)
  68. Appendix B (2/20)
  69. Appendix B (3/20)
  70. Appendix B (4/20)
  71. Appendix B (5/20)
  72. Appendix B (6/20)
  73. Appendix B (7/20)
  74. Appendix B (8/20)
  75. Appendix B (9/20)
  76. Appendix B (10/20)
  77. Appendix B (11/20)
  78. Appendix B (12/20)
  79. Appendix B (13/20)
  80. Appendix B (14/20)
  81. Appendix B (15/20)
  82. Appendix B (16/20)
  83. Appendix B (17/20)
  84. Appendix B (18/20)
  85. Appendix B (19/20)
  86. Appendix B (20/20)
  87. Back Cover

Product information

  • Title: Image Encryption
  • Author(s): Fathi E. Abd El-Samie, Hossam H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili
  • Release date: December 2013
  • Publisher(s): CRC Press
  • ISBN: 9781466576995