Table of Contents
Table of Contents
Preface pp,vii-x
Chapter 1: Image Encryption Scheme Based on Continous-Time Chaotic Systems
(Ch. K. Volos, I.M. Kyprianidis and I.N. Stouboulos, Faculty of Mathematics and Engineering Studies, Department of Military Science, Hellenic Military Academy, Greece, and others)pp,1-44
Chapter 2: Hyperchaos-Based True Random Number Generator for Data Stream Encryption
(Said Sadoudi, Camel Tanougast and Abbas Dandache, Laboratory of Communication Systems, EMP, Algeria, and others)pp,45-66
Chapter 3: Robust Image Encryption Based on a Synchronized Hybrid Discrete Continuous Chaotic System
(Mohamed Salah Azzaz, Camel Tanougast and Cédric Killian, Department of Electronics, Polytechnic Military School, Algeria, and others)pp,67-88
Chapter 4: Hyperchaotic Synchronization and Encryption for Secure Data Wireless Communication
(Camel Tanougast, University of Lorraine, Metz, France)pp,89-118
Chapter 5: Strategy for Memory-Storage Encryption-Authentication
(Fangyong Hou, Nong Xiao, Hongjun He and Fang Liu, State Key Laboratory of High Performance Computing, National University of Defense Technology, China)pp,119-136
Chapter 6: Selective Encryption of Images and Videos: From JPEG to H.265/HEVC through JPEG2000 and H.264/AVC
(Loïc Dubois, Zafar Shahid and William Puech, Université de Montpellier, Montpellier Cedex, France)pp,137-178
Chapter 7: Protecting Digital Media Using Perceptual Hashing
(Sarvjeet Herald, Rajesh Muthu, Fouad Khelifi, Akhtar Ali, Paul Vickers and Ahmed Bouridane, Faculty of Engineering and Environment,
Department of Computer Science and Digital Technologies, Northumbria University, Newcastle upon Tyne, UK)pp,179-226
Index pp,227-236