With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a comp
Visual cryptography and secret image sharing
โ Scribed by Cimato, Stelvio; Yang, Ching-Nung (eds)
- Publisher
- CRC Press
- Year
- 2012
- Tongue
- English
- Leaves
- 532
- Series
- Digital imaging and computer vision series
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data Read more...
Abstract: "With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"
โฆ Table of Contents
Content: 1. Visual cryptography from halftone error diffusion / Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo --
2. Visual cryptography for color images / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --
3. Visual cryptography for multiple secrets / Shyong Jian Shyu --
4. Extended visual cryptography for photograph images / Yasushi Yamaguchi --
5. Probabilistic visual cryptography schemes / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --
6. XOR-based visual cryptography / Daoshun Wang and Lin Dong --
7. Visual cryptography and random grids / Shyong Jian Shyu --
8. Visual cryptography and contrast bounds / Andreas Klein --
9. Visual cryptography schemes with reversing / Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci --
10. Cheating prevention in visual cryptography / Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai --
11. Resolving the alignment problem in visual cryptography / Feng Liu --
12. Applications of visual cryptography / Bernd Borchert and Klaus Reinhardt --
13. Steganography in halftone images / Oscar C. Au, Yuanfang Guo, and John S. Ho --
14. Image secret sharing / WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli --
15. Polynomial-based image sharing / Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen --
16. Image sharing with steganography and authentication / Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang --
17. Two-decoding-option image sharing method / Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen.
๐ SIMILAR VOLUMES
<p><p></p><p>This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold,
<p>This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, thre
<p>This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, thresho