Information Hiding Text in Image: Encryption

Haitham Hasan, et all

Informasi Dasar

41 kali
17.01.628
005.8
Buku - Circulation (Dapat Dipinjam)
4

Sensitive and confidential information is vulnerable to various kinds of misuse when data contained in, or transmitted to / from computer systems they may exposed to passive and / or active threats . Consequently, mechanisms must be provided for the protection of unauthorized access, undetected deletion, modification or insertion of the false information. To meet these requirements cryptographic techniques, must be employed which include, encryption algorithms, that encipher the message (plain text), into unintelligible cipher text, using ciphering key. Decryption algorithm is an inverse transformation used to recover the original message . The cryptography is currently an engineering subject in which there are more facts and rules .The digital image I (x, y) is represented as two-dimensional array of data, where each Pixel value corresponds to the brightness of the image at point (x, y). Digital image types can be divided into four categories, the first is called Binary Images, for example the text that can be considered as simplest type and can take on two values, typically black and white ‘0’ and ‘1’, the second type is called Gray-Scale Images.

Subjek

COMPUTER SECURITY
 

Katalog

Information Hiding Text in Image: Encryption
978-3-659-28848-7
xv, 88p.:il.;23cm
Inggris

Sirkulasi

Rp. 0
Rp. 1.000
Ya

Pengarang

Haitham Hasan, et all
Perorangan
 
 

Penerbit

LAP LAMBERT Academic
New York
2012

Koleksi

Kompetensi

  • CMI6H3 - KRIPTOGRAFI TERAPAN

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini