Improving image quality in visual cryptography (Record no. 29732)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191120b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789811382888
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.54
Item number YAN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Yan, Bin
245 ## - TITLE STATEMENT
Title Improving image quality in visual cryptography
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Singapore
Name of publisher, distributor, etc Springer
Date of publication, distribution, etc 2020
300 ## - PHYSICAL DESCRIPTION
Extent xviii,120 p.
Other physical details ill.
Dimensions 24 cm
365 ## - TRADE PRICE
Price amount 119.99
Price type code EUR
Unit of pricing 82.00
490 ## - SERIES STATEMENT
Series statement Signals and communication technology.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
520 ## - SUMMARY, ETC.
Summary, etc This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory
Topical term or geographic name as entry element Cryptography
Topical term or geographic name as entry element System Theory
Topical term or geographic name as entry element Visual Cryptography Algorithms
Topical term or geographic name as entry element Data Decryption
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Xiang, Yong
Corporate name or jurisdiction name as entry element Hua, Guang
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2019-11-14 1 003.54 YAN 032147 2023-03-23 2023-03-10 Books

Powered by Koha