Visual Cryptography and Secret Image Sharing (Record no. 7805)

MARC details
000 -LEADER
fixed length control field 02727 a2200361 4500
001 - CONTROL NUMBER
control field 1439837228
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250317111643.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250312042017xx 251 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439837221
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition Taylor & Francis
Terms of availability GBP 81.99
Form of issue BB
040 ## - CATALOGING SOURCE
Original cataloging agency 01
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
072 7# - SUBJECT CATEGORY CODE
Subject category code PBCD
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code PBW
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code UYT
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code THR
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code PBCD
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code PBW
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code UYT
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code THR
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code MAT003000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code TEC007000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code TEC015000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code 005.82
Source bisac
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stelvio Cimato
245 10 - TITLE STATEMENT
Title Visual Cryptography and Secret Image Sharing
250 ## - EDITION STATEMENT
Edition statement 1
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 20171219
300 ## - PHYSICAL DESCRIPTION
Extent 546 p
520 ## - SUMMARY, ETC.
Expansion of summary note With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ching-Nung Yang
Relationship B01

No items available.