000 02727 a2200361 4500
001 1439837228
005 20250317111643.0
008 250312042017xx 251 eng
020 _a9781439837221
037 _bTaylor & Francis
_cGBP 81.99
_fBB
040 _a01
041 _aeng
072 7 _aPBCD
_2thema
072 7 _aPBW
_2thema
072 7 _aUYT
_2thema
072 7 _aTHR
_2thema
072 7 _aPBCD
_2bic
072 7 _aPBW
_2bic
072 7 _aUYT
_2bic
072 7 _aTHR
_2bic
072 7 _aCOM083000
_2bisac
072 7 _aMAT003000
_2bisac
072 7 _aTEC007000
_2bisac
072 7 _aTEC015000
_2bisac
072 7 _a005.82
_2bisac
100 1 _aStelvio Cimato
245 1 0 _aVisual Cryptography and Secret Image Sharing
250 _a1
260 _bCRC Press
_c20171219
300 _a546 p
520 _bWith rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
700 1 _aChing-Nung Yang
_4B01
999 _c7805
_d7805