• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Handbook of Image-based Security Techniques /

پدید آورنده
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.

موضوع
Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1315166968
(Number (ISBN
1351681567
(Number (ISBN
9781315166964
(Number (ISBN
9781351681568
Erroneous ISBN
1138054216
Erroneous ISBN
9781138054219

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Handbook of Image-based Security Techniques /
General Material Designation
[Book]
First Statement of Responsibility
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.

EDITION STATEMENT

Edition Statement
First edition.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton, FL :
Name of Publisher, Distributor, etc.
CRC Press,
Date of Publication, Distribution, etc.
2018.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource :
Other Physical Details
text file, PDF

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Cover; Half Title; Title; Copyright; Dedication; Contents; Foreword; Preface; Authors; Section I Visual Cryptography; Chapter 1 Visual Cryptography: Introduction; 1.1 INTRODUCTION; 1.2 VISUAL CRYPTOGRAPHY; 1.3 APPLICATIONS OF VISUAL CRYPTOGRAPHY; 1.3.1 Trojan-Free Secure Transaction; 1.3.2 Authentication; 1.3.3 Access Control; 1.3.4 Transaction Tracking; 1.3.5 Watermarking; 1.4 PRELIMINARIES; 1.5 FUNDAMENTAL PRINCIPLES OF VISUAL SECRET SHARING; 1.5.1 Pixels Expansion m; 1.5.2 Contrast; 1.5.3 Basis Matrices; 1.5.4 Concept of Black and White Pixels in Visual Cryptography.
Text of Note
1.6 FORMATION OF A BASIS MATRIX1.6.1 Observations Related to The Basis Matrix Creation Approach of Naor and Shamir; 1.6.2 Essential Conditions for a Basis Matrix; 1.7 DIFFERENT EVALUATION PARAMETERS; 1.7.1 Objective Evaluation Parameters; 1.7.2 Subjective Parameters; Chapter 2 Various Dimensions of Visual Cryptography; 2.1 VARIOUS DIMENSIONS OF VISUAL CRYPTOGRAPHY; 2.1.1 Traditional Visual Cryptography (TVC); 2.1.1.1 Threshold visual cryptography; 2.1.2 Extended Visual Cryptography (EVC); 2.1.2.1 Halftone visual cryptography (HVC); 2.1.2.2 Signi cance of a halftone image over a binary image.
Text of Note
2.1.2.3 Halftone image creation using error di usion2.1.2.4 Tagged visual cryptography (TVC); 2.1.2.5 Friendly visual cryptography (FVC); 2.1.2.6 Size invariant visual cryptography; 2.1.2.7 Progressive visual cryptography (PVC); 2.1.2.8 Progressive visual cryptography with meaningful shares without pixel expan- sion; 2.1.3 Dynamic Visual Cryptography (DVC); 2.1.3.1 Multitone/Continuous tone visual cryptography (MVC); 2.1.3.2 MVC with unexpanded meaningful shares; 2.1.3.3 Perfect recovery of the secret image in MVC.
Text of Note
2.1.3.4 Visual cryptography with multiple se- crets or multi secret sharing (MSS)2.1.3.5 Angle restriction problem in MSS; 2.1.3.6 Multi secret sharing with unexpanded meaningful shares; 2.1.3.7 XOR-based visual cryptography; 2.1.3.8 Hybrid approach with XOR-based VC, multitone VC, FVC, size invariant VC and multi secret sharing; 2.1.3.9 Veri able visual cryptography (VVC); 2.1.3.10 Hybrid approach with VVC; 2.1.3.11 Random grid-based visual cryptography (RGVC); 2.1.3.12 Hybrid approaches using RGVC; Chapter 3 VC Approaches with Computationless Recovery of Secrets.
Text of Note
3.1 COMPUTATIONLESS AND COMPUTATIONƯBASED VISUAL CRYPTOGRAPHY APPROACHES3.2 BASICS FOR THE DEVELOPMENT OF COMPUTATIONƯLESS VC APPROACHES; 3.2.1 Development of Threshold Visual Cryptography; 3.2.2 Development of a Halftone Visual Cryptography (HVC) Scheme; 3.2.3 Development of a Friendly Visual Cryptography (FVC) Scheme; 3.2.4 Development of Size Invariant Visual Cryptography; 3.2.4.1 Preprocessing of secret image for size invariant visual cryptography; 3.2.4.2 Size invariant share generation with the help of the preprocessed secret.
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
"This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features:Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one bookIncludes real-life examples and applications throughoutCovers theoretical and practical concepts related to security of other multimedia objects using image based security techniquesPresents the implementation of all important concepts in MATLAB"--Provided by publisher.

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9781351681551

TOPICAL NAME USED AS SUBJECT

Computer security.
Cryptography.
Image processing.
Computer security.
COMPUTERS-- Security-- General.
Cryptography.
Image processing.

(SUBJECT CATEGORY (Provisional

COM-- 053000
COM053000
COM083000
TEC015000

DEWEY DECIMAL CLASSIFICATION

Number
[
E
]
Number
WB004
Number
WB028
Number
WB037
Number
WB057
Number
WB058
Number
WB070
Number
WB074
Number
WB075

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - PRIMARY RESPONSIBILITY

Shivani, Shivendra

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Agarwal, Suneeta
Suri, Jasjit S.

ORIGINATING SOURCE

Date of Transaction
20200822160607.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival