Visual Cryptography for Image Processing and Security

Theory, Methods, and Applications

Nonfiction, Computers, Application Software, Computer Graphics, Networking & Communications, Computer Security, General Computing
Cover of the book Visual Cryptography for Image Processing and Security by Wei Qi Yan, Feng Liu, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Wei Qi Yan, Feng Liu ISBN: 9783319234731
Publisher: Springer International Publishing Publication: October 1, 2015
Imprint: Springer Language: English
Author: Wei Qi Yan, Feng Liu
ISBN: 9783319234731
Publisher: Springer International Publishing
Publication: October 1, 2015
Imprint: Springer
Language: English

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Features: contains review exercises at the end of each chapter, as well as a helpful glossary; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Features: contains review exercises at the end of each chapter, as well as a helpful glossary; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS.

More books from Springer International Publishing

Cover of the book Energy in Australia by Wei Qi Yan, Feng Liu
Cover of the book Hybrid Systems, Optimal Control and Hybrid Vehicles by Wei Qi Yan, Feng Liu
Cover of the book Perceptions of Pregnancy from the Seventeenth to the Twentieth Century by Wei Qi Yan, Feng Liu
Cover of the book Randomness and Hyper-randomness by Wei Qi Yan, Feng Liu
Cover of the book Hydrological Data Driven Modelling by Wei Qi Yan, Feng Liu
Cover of the book Indebtedness in Early Adulthood by Wei Qi Yan, Feng Liu
Cover of the book Phosphorus Chemistry I by Wei Qi Yan, Feng Liu
Cover of the book Flowering Plants. Monocots by Wei Qi Yan, Feng Liu
Cover of the book Child and Adolescent Resilience Within Medical Contexts by Wei Qi Yan, Feng Liu
Cover of the book Combinatorial Optimization by Wei Qi Yan, Feng Liu
Cover of the book Intelligent Robotics and Applications by Wei Qi Yan, Feng Liu
Cover of the book Measuring Scholarly Impact by Wei Qi Yan, Feng Liu
Cover of the book Switzerland’s Differentiated European Integration by Wei Qi Yan, Feng Liu
Cover of the book Fuzzy Sets and Operations Research by Wei Qi Yan, Feng Liu
Cover of the book Emotion Modeling by Wei Qi Yan, Feng Liu
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy