Tell your friends about this item:
Chaos-based Encryption: a Highly Preferable Encryption Scheme
Musheer Ahmad
Chaos-based Encryption: a Highly Preferable Encryption Scheme
Musheer Ahmad
In recent years there has been a great progress in the application of chaos theory for cryptography. Due to the closeness in characteristics between chaos and cryptography, they together play a dynamic role in designing strong chaos-based security solutions. The major application areas of chaos theory includes many scientific disciplines, mathematics, programming, microbiology, biology, computer science, economics, engineering, finance, philosophy, physics, politics, population dynamics, psychology, robotics, and meteorology. Electroencephalography (EEG) signals contain sensitive health personal information of patient; therefore, it is obligatory to keep secret this information from any illegal and unauthorized access. The insecurity may results into wrong diagnosis and leak of the personal information of the patient and can even cost his life. In this book, a chaos-based encryption method is discussed to secure EEG data of patient before transmitting it over the insecure channel. Apart from these, various chaos techniques, its characteristics and various aspects of cryptography in concern with security is discussed in detail.
Media | Books Paperback Book (Book with soft cover and glued back) |
Released | July 30, 2012 |
ISBN13 | 9783659193880 |
Publishers | LAP LAMBERT Academic Publishing |
Pages | 144 |
Dimensions | 150 × 9 × 226 mm · 222 g |
Language | English |
See all of Musheer Ahmad ( e.g. Paperback Book )