• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Visual cryptography and secret image sharing

پدید آورنده
edited by Stelvio Cimato, Ching-Nung Yang.

موضوع
Computer file sharing -- Security measures.,Data encryption (Computer science),Image processing -- Security measures.

رده
TA1637
.
E358
2012

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1283311631
(Number (ISBN
1315217651
(Number (ISBN
1351824856
(Number (ISBN
1439837228
(Number (ISBN
9781283311632
(Number (ISBN
9781315217659
(Number (ISBN
9781351824859
(Number (ISBN
9781439837221

NATIONAL BIBLIOGRAPHY NUMBER

Number
b567979

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Visual cryptography and secret image sharing
General Material Designation
[Book]
First Statement of Responsibility
edited by Stelvio Cimato, Ching-Nung Yang.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton, FL
Name of Publisher, Distributor, etc.
CRC Press
Date of Publication, Distribution, etc.
©2012.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
(xxxvi, 501 pages) : illustrations (some color)

SERIES

Series Title
Digital imaging and computer vision series.

CONTENTS NOTE

Text of Note
1. Visual cryptography from halftone error diffusion / Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo --; 2. Visual cryptography for color images / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --; 3. Visual cryptography for multiple secrets / Shyong Jian Shyu --; 4. Extended visual cryptography for photograph images / Yasushi Yamaguchi --; 5. Probabilistic visual cryptography schemes / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --; 6. XOR-based visual cryptography / Daoshun Wang and Lin Dong --; 7. Visual cryptography and random grids / Shyong Jian Shyu --; 8. Visual cryptography and contrast bounds / Andreas Klein --; 9. Visual cryptography schemes with reversing / Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci --; 10. Cheating prevention in visual cryptography / Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai --; 11. Resolving the alignment problem in visual cryptography / Feng Liu --; 12. Applications of visual cryptography / Bernd Borchert and Klaus Reinhardt --; 13. Steganography in halftone images / Oscar C. Au, Yuanfang Guo, and John S. Ho --; 14. Image secret sharing / WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli --; 15. Polynomial-based image sharing / Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen --; 16. Image sharing with steganography and authentication / Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang --; 17. Two-decoding-option image sharing method / Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen.

SUMMARY OR ABSTRACT

Text of Note
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field--

TOPICAL NAME USED AS SUBJECT

Computer file sharing -- Security measures.
Data encryption (Computer science)
Image processing -- Security measures.

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TA1637
Book number
.
E358
2012

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Stelvio Cimato, Ching-Nung Yang.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Ching-Nung Yang
Stelvio Cimato

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival