Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910464706103321 |
Boca Raton, Fla. : , : CRC Press, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Classificazione | COM083000MAT003000TEC015000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910789483503321 |
Boca Raton, Fla. : , : CRC Press, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, FL, : CRC Press, c2012 |
Descrizione fisica | 1 online resource (533 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
CimatoStelvio
YangChing-Nung |
Collana | Digital imaging and computer vision |
Soggetto topico |
Image processing - Security measures
Data encryption (Computer science) Computer file sharing - Security measures Image files - Security measures |
ISBN |
1-351-83354-5
1-315-21765-1 1-283-31163-1 9786613311634 1-4398-3722-8 |
Classificazione | COM083000MAT003000TEC015000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method |
Record Nr. | UNINA-9910813853303321 |
Boca Raton, FL, : CRC Press, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|