Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications
Autor Feng Liu, Wei Qi Yanen Limba Engleză Hardback – 22 oct 2015
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 317.66 lei 43-57 zile | |
Springer International Publishing – 23 aug 2016 | 317.66 lei 43-57 zile | |
Hardback (1) | 326.13 lei 22-36 zile | |
Springer International Publishing – 22 oct 2015 | 326.13 lei 22-36 zile |
Preț: 326.13 lei
Preț vechi: 407.66 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
62.42€ • 65.06$ • 51.96£
62.42€ • 65.06$ • 51.96£
Carte disponibilă
Livrare economică 16-30 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319234724
ISBN-10: 3319234722
Pagini: 167
Ilustrații: XVI, 167 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.51 kg
Ediția:2nd ed. 2015
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319234722
Pagini: 167
Ilustrații: XVI, 167 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.51 kg
Ediția:2nd ed. 2015
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Introduction.- Various Problems in Visual Cryptography.- Cheating Prevention of Visual Cryptography.- Various Visual Cryptography Schemes.- Various Color Schemes of Visual Cryptography.- Various Applications of Visual Cryptography.
Recenzii
“In this slim but overly packed volume, visual cryptography is reviewed along with its fundamental concepts in theory and practice. … At the end of each chapter, there are questions and exercises, which may assist the reader in grasping the importance of the material presented. In addition, there are voluminous references that supplement each chapter.” (G. Mick Smith, Computing Reviews, February, 2016)
Textul de pe ultima copertă
This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography.
The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares.
Topics and features:
• Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW)
• Provides a thorough introduction to the field of visual cryptography
• Examines various common problems in visual cryptography,
including the alignment, flipping, cheating, distortion, and thin line problems
• Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS
• Describes different methods for presenting color content using visual cryptographic techniques
• Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS
This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do
The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares.
Topics and features:
• Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW)
• Provides a thorough introduction to the field of visual cryptography
• Examines various common problems in visual cryptography,
including the alignment, flipping, cheating, distortion, and thin line problems
• Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS
• Describes different methods for presenting color content using visual cryptographic techniques
• Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS
This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do
Caracteristici
Logically structured, systematically presenting the material in a simple-to-follow way Presents detailed derivations of the results, supported by numerous illustrations Updated new edition enhanced with review exercises and a glossary Includes supplementary material: sn.pub/extras