Visual cryptography and secret image sharing / edited by Stelvio Cimato, Ching-Nung Yang.

Contributor(s): Cimato, Stelvio | Yang, Ching-NungSeries: Digital imaging and computer visionPublisher: Boca Raton, FL : CRC Press, c2012Description: xxxvi, 501 p. : ill. (some col.) ; 24 cmISBN: 143983721X (hardback); 9781439837214 (hardback)Subject(s): Computer file sharing -- Security measures | Data encryption (Computer science) | Image files -- Security measures | Image processing -- Security measuresDDC classification: 005.82,CIM
Contents:
,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.82,CIM (Browse shelf) Link to resource Checked out to Dr. Sadiqa Arshad (61101-0834855-2) Almirah No.9, Shelf No.4 11/27/2024 MCS35071
Total holds: 0

,

,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.