توضیحاتی در مورد کتاب :
پیشرفت فناوری نوآوری های متعددی را ارائه کرده است که زندگی روزمره مردم را آسان تر و راحت تر می کند. با این حال، با فراگیرتر شدن فناوری، خطرات مربوطه نیز افزایش مییابد. حوزه رمزنگاری به راه حلی برای این مشکل روزافزون تبدیل شده است. بکارگیری الگوریتم های استراتژیک برای مسائل رمزی می تواند به صرفه جویی در زمان و انرژی در حل مشکلات در حال گسترش در این زمینه کمک کند. رمزنگاری: پیشرفتها در تحقیق و عمل، طرحهای جدید و پیشرفتهای اخیر در روشهای کنترل امنیت رمزنگاری را بررسی میکند تا کارایی مکانیسمهای امنیتی موجود را بهبود بخشد که میتواند در ایمنسازی حسگرها، دستگاهها، شبکهها، ارتباطات و دادهها کمک کند. این نشریه با برجسته کردن طیف وسیعی از موضوعات مانند امنیت سایبری، تشخیص تهدید و رمزگذاری، منبع مرجع ایده آلی برای دانشگاهیان، دانشجویان فارغ التحصیل، مهندسان، متخصصان فناوری اطلاعات، مهندسان نرم افزار، تحلیلگران امنیت، متخصصان صنعت و محققانی است که علاقه مند به گسترش دانش خود هستند. روندها و تکنیک های فعلی در زمینه رمزنگاری.
فهرست مطالب :
Title Page
Copyright Page
List of Contributors
Table of Contents
Preface
Section 1: Chaotic and DNA-Based Cryptography
Chapter 1: Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption
Chapter 2: Chaotic Function Based ECG Encryption System
Chapter 3: Biometric Image Security Using Chaos Algorithm
Chapter 4: DNA Sequence Based Cryptographic Solution for Secure Image Transmission
Chapter 5: IPHDBCM
Section 2: Cryptographic Algorithms
Chapter 6: Cryptographic Techniques Based on Bio-Inspired Systems
Chapter 7: Modification of Traditional RSA into Symmetric-RSA Cryptosystems
Chapter 8: Hybrid Approach of Modified AES
Chapter 9: Cryptographic Algorithms for Next Generation Wireless Networks Security
Chapter 10: Efficient Energy Saving Cryptographic Techniques with Software Solution in Wireless Network
Chapter 11: Applicability of Cellular Automata in Cryptanalysis
Section 3: Encryption Keys and Homomorphic Encryption
Chapter 12: A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU
Chapter 13: Provable Security for Public Key Cryptosystems
Chapter 14: Towards Parameterized Shared Key for AVK Approach
Chapter 15: Authentication of Smart Grid
Chapter 16: Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group
Chapter 17: A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
Chapter 18: A Secure Cloud Storage using ECC-Based Homomorphic Encryption
Chapter 19: Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment
Section 4: Steganography
Chapter 20: Digital Image Steganography
Chapter 21: Improved Secure Data Transfer Using Video Steganographic Technique
Chapter 22: Secure Group Message Transfer Stegosystem
Chapter 23: Implementation and Evaluation of Steganography Based Online Voting System
Section 5: Visual Cryptography
Chapter 24: Exploiting the Homomorphic Property of Visual Cryptography
Chapter 25: Basic Visual Cryptography Using Braille
Chapter 26: Threshold Secret Sharing Scheme for Compartmented Access Structures
Chapter 27: An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme
Chapter 28: A Methodological Evaluation of Crypto-Watermarking System for Medical Images
Chapter 29: Reversible Watermarking in Medical Image Using RDWT and Sub-Sample
Chapter 30: Video Saliency Detection for Visual Cryptography-Based Watermarking
Chapter 31: On the Pixel Expansion of Visual Cryptography Scheme
Chapter 32: A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS
Chapter 33: A Contemplator on Topical Image Encryption Measures
Index
توضیحاتی در مورد کتاب به زبان اصلی :
Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.