Progress in Data Encryption Research

$179.00

Camel Tanougast, PhD (Editor)
LCOMS – Department of ASEC, University of Lorraine at Metz, France

Series: Computer Science, Technology and Applications, Cryptography, Steganography and Data Security
BISAC: COM083000

Most books in cryptography deal with theory, generally introducing mathematically expressed algorithms without taking into account new research or showing how they are realized in actual software and hardware technology.

This book, on the other hand, introduces new current cryptographic systems while giving practical details and implementations in order to ensure the dissemination of new knowledge and the transfer of this research into the field of applied engineering. This book focuses on new data encryption designs and data protection schemes from academic research results and their practical implementation in several application fields.

It covers the theory and practice of the research of robust encryption, including chaotic encryption and decryption systems, chaotic synchronization encrypter/decrypter, data confidentiality protection and integrity, data authentication, key generation, hyperchaotic or chaotic random number generators and hardware/software realizations. This book also addresses the digital media (audio, image, and video) protection and the encryption- compression technique. “Progress in Data Encryption Research” is a comprehensive text that is suitable as a handbook for understanding the novelty of data encryption and security, as well as for hardware and software engineers who are interested in building new secure systems. Researchers who want to know the trend of developing new practical data encryption and data protection schemes, engineers from the industry and students can use this book as a first step to encryption engineering. (Imprint: Nova)

Clear

Details

Table of Contents

Preface pp,vii-x

Chapter 1: Image Encryption Scheme Based on Continous-Time Chaotic Systems
(Ch. K. Volos, I.M. Kyprianidis and I.N. Stouboulos, Faculty of Mathematics and Engineering Studies, Department of Military Science, Hellenic Military Academy, Greece, and others)pp,1-44

Chapter 2: Hyperchaos-Based True Random Number Generator for Data Stream Encryption
(Said Sadoudi, Camel Tanougast and Abbas Dandache, Laboratory of Communication Systems, EMP, Algeria, and others)pp,45-66

Chapter 3: Robust Image Encryption Based on a Synchronized Hybrid Discrete Continuous Chaotic System
(Mohamed Salah Azzaz, Camel Tanougast and Cédric Killian, Department of Electronics, Polytechnic Military School, Algeria, and others)pp,67-88

Chapter 4: Hyperchaotic Synchronization and Encryption for Secure Data Wireless Communication
(Camel Tanougast, University of Lorraine, Metz, France)pp,89-118

Chapter 5: Strategy for Memory-Storage Encryption-Authentication
(Fangyong Hou, Nong Xiao, Hongjun He and Fang Liu, State Key Laboratory of High Performance Computing, National University of Defense Technology, China)pp,119-136

Chapter 6: Selective Encryption of Images and Videos: From JPEG to H.265/HEVC through JPEG2000 and H.264/AVC
(Loïc Dubois, Zafar Shahid and William Puech, Université de Montpellier, Montpellier Cedex, France)pp,137-178

Chapter 7: Protecting Digital Media Using Perceptual Hashing
(Sarvjeet Herald, Rajesh Muthu, Fouad Khelifi, Akhtar Ali, Paul Vickers and Ahmed Bouridane, Faculty of Engineering and Environment,
Department of Computer Science and Digital Technologies, Northumbria University, Newcastle upon Tyne, UK)pp,179-226

Index pp,227-236

Additional information

Binding

,