Secure communication with flipping substitute permutation algorithm

About The Book

This book addresses the problem of copyright protection in open network environments. Author module embeds the CUN and distributor PIN in the image. In this module FSP algorithm is used to generate public and private keys. CS module embeds the Buyer’s PIN into the image using CS private key. Hash value of the image is computed using hashing algorithm. It helps for authentication purpose. In buyer module hash value of the received image is computed using hash function. Buyer confirmation phase is used for authentication purpose.CA module detects illegal usage. Image file is transferred via LAN or email. In this book the FSP encryption/ decryption algorithm is based on the flipping substitution and permutation operations. It is fast and fairly secure. However it is only suitable for applications that do not expose the inputs and the encrypted form of the inputs to the public.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE