LEADER 04177nam 22006255 450 001 9910366598403321 005 20201225173614.0 010 $a981-13-8289-1 024 7 $a10.1007/978-981-13-8289-5 035 $a(CKB)4100000008876887 035 $a(DE-He213)978-981-13-8289-5 035 $a(MiAaPQ)EBC5786707 035 $a(PPN)252518918 035 $a(EXLCZ)994100000008876887 100 $a20190608d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aImproving Image Quality in Visual Cryptography /$fby Bin Yan, Yong Xiang, Guang Hua 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XVIII, 120 p. 74 illus., 13 illus. in color.) 225 1 $aSignals and Communication Technology,$x1860-4862 311 $a981-13-8288-3 327 $aIntroduction -- Basic visual cryptography algorithms -- Improving the visual quality for binary secret images -- Digital Halftoning -- Improving visual quality for share images -- Improving visual quality for probabilistic and random grid schemes -- Improving visual quality for vector schemes -- Conclusion. 330 $aThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography. 410 0$aSignals and Communication Technology,$x1860-4862 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aData encryption (Computer science) 606 $aMathematics 606 $aVisualization 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aVisualization$3https://scigraph.springernature.com/ontologies/product-market-codes/M14034 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aData encryption (Computer science) 615 0$aMathematics. 615 0$aVisualization. 615 14$aSignal, Image and Speech Processing. 615 24$aCryptology. 615 24$aVisualization. 676 $a621.382 700 $aYan$b Bin$4aut$4http://id.loc.gov/vocabulary/relators/aut$01059692 702 $aXiang$b Yong$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aHua$b Guang$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910366598403321 996 $aImproving Image Quality in Visual Cryptography$92507684 997 $aUNINA