01241nam a22002891i 450099100422730970753620031010171229.0031111s1994 uik|||||||||||||||||eng 0140511350b12554698-39ule_instARCHE-058796ExLDip.to LingueitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.423Gulland, Daphne M.134059The Penguin dictionary of English idioms /Daphne M. Gulland and David Hinds-HowellLondon :Penguin Books,1994305 p. ;20 cmLingua ingleseFrasi idiomaticheDizionariLingua ingleseDizionari fraseologiciHinds-Howell, Davidauthorhttp://id.loc.gov/vocabulary/relators/aut134060.b1255469802-04-1413-11-03991004227309707536LE012 REF 423 GUL12012000254893le012-E0.00-no 01010.i1300634413-11-03LE012 REF 423 GUL 1/A22012000254909le012-E0.00-no 00000.i1300635613-11-03Penguin dictionary of English idioms1459974UNISALENTOle01213-11-03ma -enguik4204125nam 22006735 450 991029920190332120250609111902.03-319-23473-010.1007/978-3-319-23473-1(CKB)3710000000484569(SSID)ssj0001584333(PQKBManifestationID)16265030(PQKBTitleCode)TC0001584333(PQKBWorkID)14866261(PQKB)10536037(DE-He213)978-3-319-23473-1(MiAaPQ)EBC5579204(PPN)190520892(MiAaPQ)EBC4976382(EXLCZ)99371000000048456920151001d2015 u| 0engurnn|008mamaatxtccrVisual Cryptography for Image Processing and Security Theory, Methods, and Applications /by Feng Liu, Wei Qi Yan2nd ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XVI, 167 p. 65 illus., 14 illus. in color.) Bibliographic Level Mode of Issuance: Monograph3-319-23472-2 Includes bibliographical references and index.Introduction -- Various Problems in Visual Cryptography -- Cheating Prevention of Visual Cryptography -- Various Visual Cryptography Schemes -- Various Color Schemes of Visual Cryptography -- Various Applications of Visual Cryptography.This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Topics and features: • Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW) • Provides a thorough introduction to the field of visual cryptography • Examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems • Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS • Describes different methods for presenting color content using visual cryptographic techniques • Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do.Optical data processingComputer securityCoding theoryInformation theoryImage Processing and Computer Visionhttps://scigraph.springernature.com/ontologies/product-market-codes/I22021Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Optical data processing.Computer security.Coding theory.Information theory.Image Processing and Computer Vision.Systems and Data Security.Coding and Information Theory.005.82Liu Fengauthttp://id.loc.gov/vocabulary/relators/aut429829Yan Wei Qiauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910299201903321Visual Cryptography for Image Processing and Security2060919UNINA