LEADER 05032oam 2200757I 450 001 9910464706103321 005 20200520144314.0 010 $a1-351-83354-5 010 $a1-315-21765-1 010 $a1-283-31163-1 010 $a9786613311634 010 $a1-4398-3722-8 024 7 $a10.1201/b11068 035 $a(CKB)3460000000021540 035 $a(EBL)1449352 035 $a(SSID)ssj0000555712 035 $a(PQKBManifestationID)11359269 035 $a(PQKBTitleCode)TC0000555712 035 $a(PQKBWorkID)10520338 035 $a(PQKB)10151743 035 $a(MiAaPQ)EBC1449352 035 $a(CaSebORM)9781439837221 035 $a(Au-PeEL)EBL1449352 035 $a(CaPaEBR)ebr10502478 035 $a(CaONFJC)MIL331163 035 $a(OCoLC)899156225 035 $a(OCoLC)752327966 035 $a(EXLCZ)993460000000021540 100 $a20180331d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aVisual cryptography and secret image sharing /$fedited by Stelvio Cimato, Ching-Nung Yang 205 $a1st edition 210 1$aBoca Raton, Fla. :$cCRC Press,$d2012. 215 $a1 online resource (533 p.) 225 0 $aDigital imaging and computer vision 300 $aDescription based upon print version of record. 311 $a1-138-07604-X 311 $a1-4398-3721-X 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography 327 $a11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method 330 $aWith rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field--$cProvided by publisher. 410 0$aDigital Imaging and Computer Vision 606 $aImage processing$xSecurity measures 606 $aData encryption (Computer science) 606 $aComputer file sharing$xSecurity measures 606 $aImage files$xSecurity measures 608 $aElectronic books. 615 0$aImage processing$xSecurity measures. 615 0$aData encryption (Computer science) 615 0$aComputer file sharing$xSecurity measures. 615 0$aImage files$xSecurity measures. 676 $a005.8/2 701 $aCimato$b Stelvio$0902207 701 $aYang$b Ching-Nung$0902208 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464706103321 996 $aVisual cryptography and secret image sharing$92016735 997 $aUNINA