Book description
Encryption and processing of digital data at every stage is vital due for its security. This work covers various topics ranging from digital data encryption algorithms, hybrid encryption algorithm, evaluation matrices, efficient data transmission for guarding against effective communication channel degradation.
Table of contents
- Cover
- Title Page
- Copyright Page
- Preface
- Acknowledgements
- Contents
- List of Abbreviations
- 1. Introduction
- 2. Fundamentals of Image Encryption for Wireless Communications
-
3. Rubik’s Cube Encryption for Wireless Communications
- 3.1 Overview of the Proposed Hybrid Encryption Approach
- 3.2 Puzzle Concept
- 3.3 AES with Rubik’s Cube Algorithm
- 3.4 RC6 with Rubik’s Cube Algorithm
- 3.5 Chaotic Encryption Algorithm in Different Modes with Rubik’s Cube Algorithm
- 3.6 Proposed Hybrid Encryption Framework
-
3.7 Simulation Results
- 3.7.1 AES with Rubik’s Cube Algorithm (Similar Faces)
- 3.7.2 AES with Rubik’s Cube Algorithm (Different Faces)
- 3.7.3 RC6 with Rubik’s Cube Algorithm (Similar Faces)
- 3.7.4 RC6 with Rubik’s Cube Algorithm (Different Faces)
- 3.7.5 Chaotic with Rubik’s Cube Algorithm (Similar Faces)
- 3.7.6 Chaotic with Rubik’s Cube Algorithm (Different Faces)
- 4. Hybrid Rubik’s Cube Algorithm for Wireless Communications
- 5. Proposed Hybrid Encryption Framework for Reliable 3-D Wireless Video Communications
- 6. Conclusions and Future Work
- References
- Appendix A: MATLAB®Codes for Rubik’s Cube Encryption Algorithm
- Appendix B: MATLAB®Codes for Encrypted Image Communication
- Appendix C: MATLAB®Codes for Image Encryption
- Index
Product information
- Title: Hybrid Encryption Algorithms over Wireless Communication Channels
- Author(s):
- Release date: March 2021
- Publisher(s): CRC Press
- ISBN: 9781000326048
You might also like
book
Secure Edge Computing
The internet is making our daily life as digital as possible and this new era is …
book
Wireless Security Architecture
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security …
book
Probabilistic Data Structures for Blockchain-Based Internet of Things Applications
This book covers theory and practical knowledge of probabilistic data structures (PDS) and blockchain (BC) concepts. …
book
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for …