Cargando…

Visual cryptography and secret image sharing /

"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Cimato, Stelvio, Yang, Ching-Nung
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, ©2012.
Colección:Digital imaging and computer vision series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Visual cryptography from halftone error diffusion / Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo
  • 2. Visual cryptography for color images / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis
  • 3. Visual cryptography for multiple secrets / Shyong Jian Shyu
  • 4. Extended visual cryptography for photograph images / Yasushi Yamaguchi
  • 5. Probabilistic visual cryptography schemes / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis
  • 6. XOR-based visual cryptography / Daoshun Wang and Lin Dong
  • 7. Visual cryptography and random grids / Shyong Jian Shyu
  • 8. Visual cryptography and contrast bounds / Andreas Klein
  • 9. Visual cryptography schemes with reversing / Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci
  • 10. Cheating prevention in visual cryptography / Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai
  • 11. Resolving the alignment problem in visual cryptography / Feng Liu
  • 12. Applications of visual cryptography / Bernd Borchert and Klaus Reinhardt
  • 13. Steganography in halftone images / Oscar C. Au, Yuanfang Guo, and John S. Ho
  • 14. Image secret sharing / WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli
  • 15. Polynomial-based image sharing / Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen
  • 16. Image sharing with steganography and authentication / Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang
  • 17. Two-decoding-option image sharing method / Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen.