Normale Ansicht MARC-Ansicht ISBD

Handbook of Image-based Security Techniques / Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Verlag: Boca Raton, FL : CRC Press, 2018Auflage: First editionBeschreibung: 1 Online-RessourceSchlagwörter: Andere physische Formen: 1351681567. | 9781351681568. | 1138054216 | 9781138054219 | 1315166968. | 9781315166964. | 9781351681544 | 9781351681551 | Erscheint auch als: 9781351681568 Druck-AusgabeDDC-Klassifikation:
  • WB074
  • WB037
  • WB057
  • WB058
  • WB075
  • WB070
  • WB028
  • WB004
LOC-Klassifikation:
  • QA76.9.A25
Online-Ressourcen: Zusammenfassung: 1.6 FORMATION OF A BASIS MATRIX1.6.1 Observations Related to The Basis Matrix Creation Approach of Naor and Shamir; 1.6.2 Essential Conditions for a Basis Matrix; 1.7 DIFFERENT EVALUATION PARAMETERS; 1.7.1 Objective Evaluation Parameters; 1.7.2 Subjective Parameters; Chapter 2 Various Dimensions of Visual Cryptography; 2.1 VARIOUS DIMENSIONS OF VISUAL CRYPTOGRAPHY; 2.1.1 Traditional Visual Cryptography (TVC); 2.1.1.1 Threshold visual cryptography; 2.1.2 Extended Visual Cryptography (EVC); 2.1.2.1 Halftone visual cryptography (HVC); 2.1.2.2 Signi cance of a halftone image over a binary imageZusammenfassung: 2.1.3.4 Visual cryptography with multiple se- crets or multi secret sharing (MSS)2.1.3.5 Angle restriction problem in MSS; 2.1.3.6 Multi secret sharing with unexpanded meaningful shares; 2.1.3.7 XOR-based visual cryptography; 2.1.3.8 Hybrid approach with XOR-based VC, multitone VC, FVC, size invariant VC and multi secret sharing; 2.1.3.9 Veri able visual cryptography (VVC); 2.1.3.10 Hybrid approach with VVC; 2.1.3.11 Random grid-based visual cryptography (RGVC); 2.1.3.12 Hybrid approaches using RGVC; Chapter 3 VC Approaches with Computationless Recovery of SecretsZusammenfassung: Cover; Half Title; Title; Copyright; Dedication; Contents; Foreword; Preface; Authors; Section I Visual Cryptography; Chapter 1 Visual Cryptography: Introduction; 1.1 INTRODUCTION; 1.2 VISUAL CRYPTOGRAPHY; 1.3 APPLICATIONS OF VISUAL CRYPTOGRAPHY; 1.3.1 Trojan-Free Secure Transaction; 1.3.2 Authentication; 1.3.3 Access Control; 1.3.4 Transaction Tracking; 1.3.5 Watermarking; 1.4 PRELIMINARIES; 1.5 FUNDAMENTAL PRINCIPLES OF VISUAL SECRET SHARING; 1.5.1 Pixels Expansion m; 1.5.2 Contrast; 1.5.3 Basis Matrices; 1.5.4 Concept of Black and White Pixels in Visual CryptographyZusammenfassung: "This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.Features:Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one bookIncludes real-life examples and applications throughoutCovers theoretical and practical concepts related to security of other multimedia objects using image based security techniquesPresents the implementation of all important concepts in MATLAB"--Provided by publisherPPN: PPN: 1026514150Package identifier: Produktsigel: ZDB-4-NLEBK
Dieser Titel hat keine Exemplare