Visual cryptography and secret image sharing /
"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press,
©2012.
|
Colección: | Digital imaging and computer vision series.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn752327966 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 110914s2012 flua ob 001 0 eng d | ||
010 | |z 2011029864 | ||
040 | |a WAU |b eng |e pn |c WAU |d YDXCP |d OTZ |d VPI |d CDX |d COO |d E7B |d N$T |d OCLCQ |d DEBSZ |d OCLCQ |d CRCPR |d OCLCQ |d IDEBK |d UMI |d EBLCP |d OCLCQ |d PIFBY |d VGM |d OCLCQ |d UAB |d OCLCQ |d STF |d MERUC |d ERL |d OCLCQ |d CEF |d NLE |d OCLCQ |d UKMGB |d WYU |d TYFRS |d AU@ |d OCLCQ |d UHL |d OCLCQ |d LEAUB |d ESU |d OCLCF |d LOA |d LVT |d VT2 |d SFB |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
015 | |a GBB7A8754 |2 bnb | ||
016 | 7 | |a 015790260 |2 Uk | |
016 | 7 | |a 018389910 |2 Uk | |
019 | |a 816868367 |a 861278758 |a 899156225 |a 961604195 |a 991977178 |a 994848826 |a 1004620805 |a 1015203926 |a 1031043992 |a 1065709655 |a 1086566447 |a 1152700813 |a 1192345760 |a 1202566358 |a 1228590797 |a 1260364305 |a 1262682588 | ||
020 | |a 9781439837221 |q (electronic bk.) | ||
020 | |a 1439837228 |q (electronic bk.) | ||
020 | |a 1283311631 | ||
020 | |a 9781283311632 | ||
020 | |a 9781315217659 | ||
020 | |a 1315217651 | ||
020 | |a 9781351824859 | ||
020 | |a 1351824856 | ||
020 | |z 9781439837214 |q (hardback) | ||
020 | |z 143983721X |q (hardback) | ||
024 | 8 | |a 9786613311634 | |
029 | 1 | |a AU@ |b 000052162519 | |
029 | 1 | |a AU@ |b 000065168838 | |
029 | 1 | |a DEBBG |b BV041433122 | |
029 | 1 | |a DEBSZ |b 372705103 | |
029 | 1 | |a DEBSZ |b 398290865 | |
029 | 1 | |a DEBSZ |b 431528306 | |
029 | 1 | |a NZ1 |b 14263180 | |
029 | 1 | |a NZ1 |b 14938988 | |
029 | 1 | |a UKMGB |b 018389910 | |
029 | 1 | |a AU@ |b 000066132214 | |
035 | |a (OCoLC)752327966 |z (OCoLC)816868367 |z (OCoLC)861278758 |z (OCoLC)899156225 |z (OCoLC)961604195 |z (OCoLC)991977178 |z (OCoLC)994848826 |z (OCoLC)1004620805 |z (OCoLC)1015203926 |z (OCoLC)1031043992 |z (OCoLC)1065709655 |z (OCoLC)1086566447 |z (OCoLC)1152700813 |z (OCoLC)1192345760 |z (OCoLC)1202566358 |z (OCoLC)1228590797 |z (OCoLC)1260364305 |z (OCoLC)1262682588 | ||
037 | |a CL0500000323 |b Safari Books Online | ||
050 | 4 | |a TA1637 |b .V544 2012eb | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
072 | 7 | |a PBCD |2 bicssc | |
082 | 0 | 4 | |a 005.8/2 |2 23 |
084 | |a COM083000 |a MAT003000 |a TEC015000 |2 bisacsh | ||
049 | |a UAMI | ||
245 | 0 | 0 | |a Visual cryptography and secret image sharing / |c edited by Stelvio Cimato, Ching-Nung Yang. |
260 | |a Boca Raton, FL : |b CRC Press, |c ©2012. | ||
300 | |a 1 online resource (xxxvi, 501 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Digital imaging and computer vision series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a 1. Visual cryptography from halftone error diffusion / Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo -- 2. Visual cryptography for color images / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis -- 3. Visual cryptography for multiple secrets / Shyong Jian Shyu -- 4. Extended visual cryptography for photograph images / Yasushi Yamaguchi -- 5. Probabilistic visual cryptography schemes / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis -- 6. XOR-based visual cryptography / Daoshun Wang and Lin Dong -- 7. Visual cryptography and random grids / Shyong Jian Shyu -- 8. Visual cryptography and contrast bounds / Andreas Klein -- 9. Visual cryptography schemes with reversing / Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci -- 10. Cheating prevention in visual cryptography / Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai -- 11. Resolving the alignment problem in visual cryptography / Feng Liu -- 12. Applications of visual cryptography / Bernd Borchert and Klaus Reinhardt -- 13. Steganography in halftone images / Oscar C. Au, Yuanfang Guo, and John S. Ho -- 14. Image secret sharing / WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli -- 15. Polynomial-based image sharing / Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen -- 16. Image sharing with steganography and authentication / Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang -- 17. Two-decoding-option image sharing method / Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen. | |
520 | |a "With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"-- |c Provided by publisher. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Image processing |x Security measures. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Computer file sharing |x Security measures. | |
650 | 0 | |a Image files |x Security measures. | |
650 | 6 | |a Traitement d'images |x Sécurité |x Mesures. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Partage de fichiers (Informatique) |x Sécurité |x Mesures. | |
650 | 6 | |a Fichiers d'images |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
700 | 1 | |a Cimato, Stelvio. | |
700 | 1 | |a Yang, Ching-Nung. | |
758 | |i has work: |a Visual cryptography and secret image sharing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFChv6MDt3QgCHFDgXMdHy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Visual cryptography and secret image sharing. |d Boca Raton, FL : CRC Press, ©2012 |z 9781439837214 |w (DLC) 2011029864 |w (OCoLC)475450986 |
830 | 0 | |a Digital imaging and computer vision series. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781439837221/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1449352 |z Texto completo |
938 | |a Coutts Information Services |b COUT |n 19873007 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1449352 | ||
938 | |a ebrary |b EBRY |n ebr10502478 | ||
938 | |a EBSCOhost |b EBSC |n 398424 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 331163 | ||
938 | |a Taylor & Francis |b TAFR |n 9781315217659 | ||
938 | |a Taylor & Francis |b TAFR |n CRC0KE11693PDF | ||
938 | |a YBP Library Services |b YANK |n 3652063 | ||
994 | |a 92 |b IZTAP |