Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Cryptanalyzing Some Multimedia Encryption Schemes



Год выпуска: 2012
Автор: Chengqing Li
Издательство: LAP Lambert Academic Publishing
Страниц: 168
ISBN: 9783659172694
Описание
Low efficiency of the traditional text encryption schemes to protect the multimedia data makes designing secure and efficient multimedia encryption schemes become urgent. Many specific multimedia encryption schemes were designed by adopting some related nonlinear theories. However, shortage of security scrutiny of multimedia encryption schemes frustrated progress of their security level. As a digital image is a typical form of multimedia data and it can show performance of an encryption scheme effectively, many multimedia (chaos-based) encryption schemes adopt images as the encryption object. This book focuses on evaluating the security of six image schemes against some common attack methods, such as brute-force attack, known/chosen-plaintext attack and differential attack. Both rigorous theoretical analyses and detailed experimental results are provided to support the security defects. In addition, some general recommendations for designing secure multimedia encryption scheme are...


Похожие книги

  1. Ehrlich Multimedia Inc. Lift Off! Chemistry. – М.: , 1996. – 24 с.
  2. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  3. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  4. Sudip Dogra. Design & Development of Wireless Multimedia Receiving System. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  5. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  6. Tinashe Moira Dune. Constructions of Sexuality and Disability. – М.: LAP Lambert Academic Publishing, 2011. – 188 с.
  7. Maged Hamada Ibrahim. Coercion Resistant Cryptosystems. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  8. Vibha Verma. Multicrypt Vs Single Encryption Scheme. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  9. Aldrin Wanambisi. Probabilistic Encryption. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  10. Mayank Chandra. Digital Video Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  11. Shaimaa A. Elsaid. Securing Multi-Media Transmission over Mobile Communications Channels. – М.: LAP Lambert Academic Publishing, 2012. – 228 с.
  12. Chengqing Li. Cryptanalyzing Some Multimedia Encryption Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  13. Faisal Riaz,Muhammad Akram and Rashid Mehmood. WiMAX Cryptographic Suit Up-gradation. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  14. Su Su Maung. Image Encryption Scheme Based on Chaotic Maps. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  15. Mohammed Baqer M. Kamel and Loay E. George. Trusty Patient Monitoring System. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  16. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  17. Ramkrishna Das and Shyamalendu Kandar. An Approach to Develop Secured Secret Sharing Schemes for Color Image. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.

Образцы работ

Тема и предметТип и объем работы
Основные принципы построения и функционирования логической информационной системы
Информационные технологии управления
Курсовая работа
29 стр.
Системный подход к решению проблем средствами информационных систем
Информатика
Реферат
16 стр.
Гражданско-правовое положение обществ с ограниченной ответственностью по законодательству РФ
Гражданское право
Дипломный проект
80 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юлия, 04.05
Спасибо большое за понимание!