Friday, August 2, 2019

Visual Cryptography and Secret Image Sharing (Free PDF)


File Size: 9.96 Mb

Description
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

Content:-
List of Figures
List of Tables
Preface
Contributors
1. Visual Cryptography from Halftone Error Diffusion
2. Visual Cryptography for Color Images'
3. Visual Cryptography for Multiple Secrets
4. Extended Visual Cryptography for Photograph Images
5. Probabilistic Visual Cryptography Schemes
6. XOR-Based Visual Cryptography
7. Visual Cryptography and Random Grids
8. Visual Cryptography and Contrast Bounds
9. Visual Cryptography Schemes with Reversing
10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography
12. Applications of Visual Cryptography
13. Steganography in Halftone Images
14. Image Secret Sharing
15. Polynomial-Based Image Sharing
16. Image Sharing with Steganography and Authentication
17. Two-Decoding-Option Image Sharing Method
Index

Author Details
"Stelvio Cimato"

"Ching-Nung Yang"




Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment