Applications of Encryption and Watermarking for Information Security
5% Pre Publication Discount available until one month after release.

Applications of Encryption and Watermarking for Information Security

Boussif Mohamed (University of Tunis El-manar, Tunisia)
Pages: 300
DOI: 10.4018/978-1-6684-4945-5
ISBN13: 9781668449455|ISBN10: 1668449455|EISBN13: 9781668449479|ISBN13 Softcover: 9781668449462
Hardcover:
Forthcoming
$213.75
List Price: $225.00
5% Discount:-$11.25
TOTAL SAVINGS: $11.25
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Forthcoming
$192.38
List Price: $225.00
10% Discount:-$22.50
5% Discount:-$10.13
TOTAL SAVINGS: $32.63
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Forthcoming
$256.50
List Price: $270.00
5% Discount:-$13.50
TOTAL SAVINGS: $13.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Softcover:
Forthcoming
$161.50
List Price: $170.00
5% Discount:-$8.50
TOTAL SAVINGS: $8.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Description & Coverage
Description:

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. This book consists of the application of data watermarking and watermarking methods for the security of various types of data.

This book provides novel methods of cryptography and steganography which are more efficient in terms of security and time/space complexity. Covering topics such as data encryption, cryptanalysis, and encryption and watermarking attacks, this book is an essential resource for computer scientists, government officials, researchers, students and educators of higher education, and academicians.

Coverage:
Table of Contents
Search this Book:
Reset
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.