Visual cryptography and secret image sharing (Record no. 28819)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180214b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138076044
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number CIM
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Climato, Stelvio
245 ## - TITLE STATEMENT
Title Visual cryptography and secret image sharing
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Crc Press,
Place of publication, distribution, etc Boca Raton:
Date of publication, distribution, etc 2011
300 ## - PHYSICAL DESCRIPTION
Extent xxxvi, 501 p.
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code GBP
Price amount 59.95, Rs. 5365.53
520 ## - SUMMARY, ETC.
Summary, etc With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"-- "Preface Secure digital imaging is an important research area combining methods and techniques coming from cryptography and image processing. Visual cryptography and in general secret image sharing techniques enable distributing sensitive visual materials to involved participants through public communication channels, as the generated secure images do not reveal any information if they are not combined in the prescribed way. In visual cryptography, the decoding process is performed directly by the human eyes, while in general, the shared images need some processing to reconstruct the secret image. The increasing number of possibilities to create, publish, and distribute images calls for novel protection methods, o ering new sharing and access control mechanisms for the information contained in the published images. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. Since both digital imaging and privacy protection are two research themes that involve a continuously growing number of people and applications, the book focuses on secure image sharing techniques, o ering an interesting reference point for studying and developing solutions needed in such areas. This book aims to ll the existing literature gap, providing a valid guide for professional people and/​or researchers interested in such elds of research. It provides a scienti cally and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, and practitioners who are interested or involved in the study, research, use, design, and development of image sharing techniques
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer file sharing
Topical term or geographic name as entry element Security measures
Topical term or geographic name as entry element Imaging Systems
Topical term or geographic name as entry element Image processing
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Ching-Nung
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2018-02-14 6 005.82 CIM 031167 2023-03-23 2023-03-10 Books

Powered by Koha