Wednesday 12 January 2011

Cryptography based Visual Data Protection Download

Cryptography based Visual Data Protection
Author: Naveed Islam
Edition:
Binding: Paperback
ISBN: 3846596221



Cryptography based Visual Data Protection: The Protection, Security and Integrity of Visual Data


The principal objective of this manuscript is to achieve protection of visual data especially images through modern cryptographic techniques. Get Cryptography based Visual Data Protection computer books for free.
In this context, the focus of the work in perspective is two folded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity of image data in the encrypted domain during transmission. We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, namely, the RSA and the Paillier. The proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. Check Cryptography based Visual Data Protection our best computer books for 2013. All books are available in pdf format and downloadable from rapidshare, 4shared, and mediafire.

download

Cryptography based Visual Data Protection Download


In this context, the focus of the work in perspective is two folded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity of image data in the encrypted domain during transmission. We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, namely, the RSA and the Paillier. The proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate n this context, the focus of the work in perspective is two folded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity of image data in the encrypted domain during transmission. We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, namely, the RSA and the Paillier. The proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate.

Related Computer Books


No comments:

Post a Comment