Image and Video Encryption pp 135-136 | Cite asConclusionsChapter 1.7k Downloads Part of the Advances in Information Security book series (ADIS, volume 15)This is a preview of subscription content, log in to check access.Copyright information© Springer Science + Business Media, Inc. 2005