Search Books
Circular and Linear Regress… Software Metrics: A Rigorou…

Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)

Publisher CRC Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
116.85 159.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $138.99

✓ Usually ships in 24 hours

Share:
Book Details
PublisherCRC Press
ISBN / ASIN143983721X
ISBN-139781439837214
AvailabilityUsually ships in 24 hours
Sales Rank3,138,589
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

  • Potential for sharing multiple secrets
  • Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View