Advances in Intelligent Systems and Applications - Volume 2 [[electronic resource] ] : Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 / / edited by Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (802 p.) |
Disciplina | 006.3 |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN |
1-283-94583-5
3-642-35473-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA. |
Record Nr. | UNINA-9910437897603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 626 p. 278 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Biometrics (Biology) Coding theory Information theory Cryptology Systems and Data Security Biometrics Coding and Information Theory |
ISBN | 3-319-19321-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis. |
Record Nr. | UNINA-9910483252903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 626 p. 278 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Biometrics (Biology) Coding theory Information theory Cryptology Systems and Data Security Biometrics Coding and Information Theory |
ISBN | 3-319-19321-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis. |
Record Nr. | UNISA-996198536403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security with Intelligent Computing and Big-data Services [[electronic resource] ] : Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) / / edited by Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (933 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-030-16946-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484753903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910464706103321 |
Boca Raton, Fla. : , : CRC Press, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Classificazione | COM083000MAT003000TEC015000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910789483503321 |
Boca Raton, Fla. : , : CRC Press, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Classificazione | COM083000MAT003000TEC015000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910813853303321 |
Boca Raton, Fla. : , : CRC Press, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|