語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Visual Cryptography for Image Proces...
~
Liu, Feng.
Visual Cryptography for Image Processing and Security = Theory, Methods, and Applications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Visual Cryptography for Image Processing and Security/ by Feng Liu, Wei Qi Yan.
其他題名:
Theory, Methods, and Applications /
作者:
Liu, Feng.
其他作者:
Yan, Wei Qi.
面頁冊數:
XVI, 167 p. 65 illus., 14 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Optical data processing. -
電子資源:
https://doi.org/10.1007/978-3-319-23473-1
ISBN:
9783319234731
Visual Cryptography for Image Processing and Security = Theory, Methods, and Applications /
Liu, Feng.
Visual Cryptography for Image Processing and Security
Theory, Methods, and Applications /[electronic resource] :by Feng Liu, Wei Qi Yan. - 2nd ed. 2015. - XVI, 167 p. 65 illus., 14 illus. in color.online resource.
Introduction -- Various Problems in Visual Cryptography -- Cheating Prevention of Visual Cryptography -- Various Visual Cryptography Schemes -- Various Color Schemes of Visual Cryptography -- Various Applications of Visual Cryptography.
This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Topics and features: • Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW) • Provides a thorough introduction to the field of visual cryptography • Examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems • Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS • Describes different methods for presenting color content using visual cryptographic techniques • Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do.
ISBN: 9783319234731
Standard No.: 10.1007/978-3-319-23473-1doiSubjects--Topical Terms:
639187
Optical data processing.
LC Class. No.: TA1630-1650
Dewey Class. No.: 006.6
Visual Cryptography for Image Processing and Security = Theory, Methods, and Applications /
LDR
:03112nam a22004215i 4500
001
966162
003
DE-He213
005
20200701212703.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319234731
$9
978-3-319-23473-1
024
7
$a
10.1007/978-3-319-23473-1
$2
doi
035
$a
978-3-319-23473-1
050
4
$a
TA1630-1650
072
7
$a
UYT
$2
bicssc
072
7
$a
COM012000
$2
bisacsh
072
7
$a
UYT
$2
thema
072
7
$a
UYQV
$2
thema
082
0 4
$a
006.6
$2
23
082
0 4
$a
006.37
$2
23
100
1
$a
Liu, Feng.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
786440
245
1 0
$a
Visual Cryptography for Image Processing and Security
$h
[electronic resource] :
$b
Theory, Methods, and Applications /
$c
by Feng Liu, Wei Qi Yan.
250
$a
2nd ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
XVI, 167 p. 65 illus., 14 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Various Problems in Visual Cryptography -- Cheating Prevention of Visual Cryptography -- Various Visual Cryptography Schemes -- Various Color Schemes of Visual Cryptography -- Various Applications of Visual Cryptography.
520
$a
This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Topics and features: • Contains review exercises at the end of each chapter, as well as a helpful glossary (NEW) • Provides a thorough introduction to the field of visual cryptography • Examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems • Reviews a range of visual cryptography schemes, including XOR-based visual cryptography and security enriched VCS • Describes different methods for presenting color content using visual cryptographic techniques • Covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in do.
650
0
$a
Optical data processing.
$3
639187
650
0
$a
Computer security.
$3
557122
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
1 4
$a
Image Processing and Computer Vision.
$3
670819
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Coding and Information Theory.
$3
669784
700
1
$a
Yan, Wei Qi.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1069182
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319234724
776
0 8
$i
Printed edition:
$z
9783319234748
776
0 8
$i
Printed edition:
$z
9783319363844
856
4 0
$u
https://doi.org/10.1007/978-3-319-23473-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入