Visual Cryptography and Secret Image Sharing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Visual Cryptography and Secret Image Sharing by , CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781351833547
Publisher: CRC Press Publication: December 19, 2017
Imprint: CRC Press Language: English
Author:
ISBN: 9781351833547
Publisher: CRC Press
Publication: December 19, 2017
Imprint: CRC Press
Language: English

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

  • Potential for sharing multiple secrets
  • Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

More books from CRC Press

Cover of the book FPGA-Based Embedded System Developer's Guide by
Cover of the book Dam Maintenance and Rehabilitation by
Cover of the book The Basics of Investigating Forensic Science by
Cover of the book Geospatial Data Science Techniques and Applications by
Cover of the book Handbook of Optoelectronics by
Cover of the book Fracture Processes of Concrete by
Cover of the book Fracture and Size Effect in Concrete and Other Quasibrittle Materials by
Cover of the book Dictionary of Evolutionary Fish Osteology by
Cover of the book .NET 4 for Enterprise Architects and Developers by
Cover of the book Introduction to PCM Telemetering Systems by
Cover of the book Image Processing and Mathematical Morphology by
Cover of the book Occurrence, Toxicity & Analysis of Toxic Compounds in Oceanic Biota by
Cover of the book Multisensor Data Fusion and Machine Learning for Environmental Remote Sensing by
Cover of the book The Lipids of Human Milk by
Cover of the book Handbook of Drought and Water Scarcity by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy