Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (1)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition

Binding

Collectible Attributes

  • First Edition (No further results match this refinement)
  • Signed (No further results match this refinement)
  • Dust Jacket (No further results match this refinement)
  • Seller-Supplied Images (No further results match this refinement)
  • Not Print on Demand (1)

Language (1)

Price

  • Any Price 
  • Under US$ 25 
  • US$ 25 to US$ 50 (No further results match this refinement)
  • Over US$ 50 (No further results match this refinement)
Custom price range (US$)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

Seller Rating

  • Mangal Deep Gupta and Rajeev Kumar Chauhan

    Published by TechSar Pvt. Ltd, 2024

    ISBN 10: 8197443807 ISBN 13: 9788197443800

    Language: English

    Seller: Vedams eBooks (P) Ltd, New Delhi, India

    Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

    Contact seller

    US$ 20.54 shipping from India to U.S.A.

    Destination, rates & speeds

    Quantity: 5 available

    Add to basket

    Soft cover. Condition: New. Contents: 1. Preface 2. Acknowledgements 3. Scope and Overview of the Book 4. Introduction 5. Study of RNGs and Image Encryption Algorithms 6. Coupled Variable Input-LCG and Clock Divider Based PRBG 7. PRBG Using Coupled-LCG and Multistage LFSR with Clock Gating Network 8. PRNG Using Chaotic Systems 9. Image Encryption Scheme Using Linear PRNG 10. Image Encryption Scheme Using Non-Linear System 11. Conclusion and Future Scope 12. Appendix 13. References 14. Index Preservation of information confidentiality has paved the way for numerous applications of cryptography in domains such as defence, finance, telecardiology, healthcare, and biometric information. In these spheres, information undergoes processing, storage, and robust protection against any disruption. This book serves as a comprehensive guide, elucidating the creation of secret keys, from their mathematical formulation to the implementation of VLSI circuits utilized in cryptography to conceal image or data information. It encompasses historical precedents as well as current advancements. By delving into this text, you will acquire the knowledge necessary to efficiently encrypt data through various PRNGs and encryption algorithms.