301,95 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.
An exploration of the most prominent topics in digital imaging security, this book discusses:
Potential for sharing multiple secrets
Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
Inclusion of pictures in the distributed shares
Contrast enhancement techniques
Color-image visual cryptography
Cheating prevention
Alignment problems for image shares
Steganography and authentication
In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.
An exploration of the most prominent topics in digital imaging security, this book discusses:
Potential for sharing multiple secrets
Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
Inclusion of pictures in the distributed shares
Contrast enhancement techniques
Color-image visual cryptography
Cheating prevention
Alignment problems for image shares
Steganography and authentication
In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
Visual Cryptography from Halftone Error Diffusion. Visual Cryptography for Color Images. Visual Cryptography for Multiple Secrets. Extended Visual Cryptography for Photograph Images. Probabilistic Visual Cryptography Schemes. XOR-Based Visual Cryptography. Visual Cryptography and Random Grids. Visual Cryptography and Contrast Bounds. Visual Cryptography Schemes with Reversing. Cheating Prevention in Visual Cryptography. Resolving the Alignment Problem in Visual Cryptography. Applications of Visual Cryptography. Steganography in Halftone Images. Image Secret Sharing. Polynomial-based Image Sharing. Image Sharing with Steganography and Authentication. Two-Decoding-Option Image Sharing Method.
Erscheinungsjahr: | 2011 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Einband - fest (Hardcover) |
ISBN-13: | 9781439837214 |
ISBN-10: | 143983721X |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: | Cimato, Stelvio |
Redaktion: |
Cimato, Stelvio
Yang, Ching-Nung |
Hersteller: | CRC Press |
Verantwortliche Person für die EU: | Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 240 x 161 x 34 mm |
Von/Mit: | Stelvio Cimato (u. a.) |
Erscheinungsdatum: | 10.08.2011 |
Gewicht: | 0,977 kg |
Visual Cryptography from Halftone Error Diffusion. Visual Cryptography for Color Images. Visual Cryptography for Multiple Secrets. Extended Visual Cryptography for Photograph Images. Probabilistic Visual Cryptography Schemes. XOR-Based Visual Cryptography. Visual Cryptography and Random Grids. Visual Cryptography and Contrast Bounds. Visual Cryptography Schemes with Reversing. Cheating Prevention in Visual Cryptography. Resolving the Alignment Problem in Visual Cryptography. Applications of Visual Cryptography. Steganography in Halftone Images. Image Secret Sharing. Polynomial-based Image Sharing. Image Sharing with Steganography and Authentication. Two-Decoding-Option Image Sharing Method.
Erscheinungsjahr: | 2011 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Inhalt: | Einband - fest (Hardcover) |
ISBN-13: | 9781439837214 |
ISBN-10: | 143983721X |
Sprache: | Englisch |
Einband: | Gebunden |
Autor: | Cimato, Stelvio |
Redaktion: |
Cimato, Stelvio
Yang, Ching-Nung |
Hersteller: | CRC Press |
Verantwortliche Person für die EU: | Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 240 x 161 x 34 mm |
Von/Mit: | Stelvio Cimato (u. a.) |
Erscheinungsdatum: | 10.08.2011 |
Gewicht: | 0,977 kg |