๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Visual Cryptography and Its Applications

โœ Scribed by Jonathan Patrick Weir


Publisher
Bookboon
Tongue
English
Leaves
144
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"In this thesis, a number of new schemes are presented which address current problems and shortcomings within the area of visual cryptography. Visual cryptography provides a very powerful means by which a secret, in the form of a digital image, can be distributed (encoded) into two or more pieces known as shares. When these shares are xeroxed onto transparencies and superimposed exactly together, the original secret can be recovered (decoded) without the necessity for computation. Traditionally, visual cryptography allows effective and efficient sharing of a single secret between a number of trusted parties. One aspect of the research within this thesis specifically addresses the issues of embedding more than two secrets within a set of two shares. Alignment poses a further problem. The placement of the shares must be specific. In order to ease ali~ent, the techniques developed within this thesis for sharing multiple secrets relaxes this restriction. The result is a scheme in which the shares can be superimposed upon one another in a multitude of positions and alignment styles which enables multiple secret recovery. Applications of visual cryptography are also examined and presented. This is an area within visual cryptography that has had very little attention in terms of research. The primary focus of the work presented within this thesis concentrates on applications of visual cryptography in real world scenarios. For such a simple and effective method of sharing secrets, practical applications are as yet, limited. A number of novel uses for visual cryptography are presented that use theoretical techniques in a practical way.


๐Ÿ“œ SIMILAR VOLUMES


Visual Cryptography and Its Applications
โœ Weir J., Yan WeiQi. ๐Ÿ“‚ Library ๐ŸŒ English

BoBoCoAe, 2015. โ€” 163 p. โ€” ISBN: 8740301265, 9788740301267<div class="bb-sep"></div>In this book, one of data security methods known as visual cryptography (VC) is presented.<div class="bb-sep"></div>Specifically, visual cryptography allows effective and efficient secret sharing between a number of

Number Theory and Its Applications to Cr
โœ Indulata Sukla ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Kalyani Publishers ๐ŸŒ English

Number Theory and Its Applications to Cryptography (2004) By Indulata Sukla Kalyani Publishers, New Delhi

Visual Cryptography for Image Processing
โœ Feng Liu; Wei Qi Yan ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer ๐ŸŒ English

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold,

Visual Cryptography for Image Processing
โœ Feng Liu, Wei Qi Yan (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, thre

Visual Cryptography for Image Processing
โœ Feng Liu, Wei Qi Yan (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, thresho

Visual Cryptography for Image Processing
โœ Feng Liu, Wei Qi Yan ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Springer ๐ŸŒ English

This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, thresho