Cantitate/Preț
Produs

Visual Cryptography and Secret Image Sharing: Digital Imaging and Computer Vision

Editat de Stelvio Cimato, Ching-Nung Yang
en Limba Engleză Paperback – 29 mar 2017
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.
Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.
An exploration of the most prominent topics in digital imaging security, this book discusses:
  • Potential for sharing multiple secrets
  • Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication
In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 45238 lei  6-8 săpt.
  CRC Press – 29 mar 2017 45238 lei  6-8 săpt.
Hardback (1) 109557 lei  6-8 săpt.
  CRC Press – 10 aug 2011 109557 lei  6-8 săpt.

Din seria Digital Imaging and Computer Vision

Preț: 45238 lei

Preț vechi: 59026 lei
-23% Nou

Puncte Express: 679

Preț estimativ în valută:
8660 9434$ 7265£

Carte tipărită la comandă

Livrare economică 18 decembrie 24 - 01 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781138076044
ISBN-10: 113807604X
Pagini: 546
Ilustrații: 43 Tables, black and white; 37 Illustrations, color; 214 Illustrations, black and white
Dimensiuni: 156 x 234 x 28 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Digital Imaging and Computer Vision

Locul publicării:Boca Raton, United States

Cuprins

Visual Cryptography from Halftone Error Diffusion. Visual Cryptography for Color Images. Visual Cryptography for Multiple Secrets. Extended Visual Cryptography for Photograph Images. Probabilistic Visual Cryptography Schemes. XOR-Based Visual Cryptography. Visual Cryptography and Random Grids. Visual Cryptography and Contrast Bounds. Visual Cryptography Schemes with Reversing. Cheating Prevention in Visual Cryptography. Resolving the Alignment Problem in Visual Cryptography. Applications of Visual Cryptography. Steganography in Halftone Images. Image Secret Sharing. Polynomial-based Image Sharing. Image Sharing with Steganography and Authentication. Two-Decoding-Option Image Sharing Method.

Notă biografică

Stelvio Cimato, Ching-Nung Yang

Descriere

This book covers an extensive range of topics related to visual cryptography techniques and secure image sharing solutions. It addresses sharing multiple secrets and visual cryptography schemes based on the probabilistic reconstruction of the secret image, including pictures in the distributed shares, contrast enhancement techniques, visual cryptography schemes based on different logical operations for combining shared images, cheating prevention, and the alignment problem for image shares. The book also describes practical applications, steganography, and authentication. Case studies demonstrate the effectiveness of the techniques.