Handbook of image-based security techniques /
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for...
Main Authors: | , , |
---|---|
Corporate Author: | |
Format: | Book |
Language: | English |
Published: |
Boca Raton :
CRC Press, Taylor and Francis Group, CRC Press, is an imprint of the Taylor and Francis an informa business,
[2018]
Boca Raton : CRC Press, 2018 |
Subjects: |
LEADER | 08249nam a2200961 i 4500 | ||
---|---|---|---|
001 | ca82adad-b36b-4616-8a5f-ba75d035ba2d | ||
005 | 20240728000000.0 | ||
008 | 180309s2018 flu o f 001 0 eng | ||
010 | |a 2020691561 | ||
010 | |a 2020691561 | ||
019 | |a 1037351971 |a 1048765870 |a 1289813117 | ||
020 | |a 1315166968 | ||
020 | |a 1351681559 | ||
020 | |a 1351681567 | ||
020 | |a 9781315166964 |q (e-book) | ||
020 | |a 9781351681551 |q ebook | ||
020 | |a 9781351681568 |q (e-book ; |q PDF) | ||
020 | |z 1138054216 | ||
020 | |z 9781138054219 |q acid-free paper | ||
024 | 7 | |a 10.1201/9781315166964 |2 doi | |
035 | |a (NNC)15132078 | ||
035 | |a (NcD)008342193DUK01 | ||
035 | |a (OCoLC)1033537393 |z (OCoLC)1037351971 |z (OCoLC)1048765870 |z (OCoLC)1289813117 | ||
035 | |a (OCoLC)on1033537393 | ||
035 | |a 1033537393 | ||
040 | |a DLC |b eng |e rda |c DLC |d EBLCP |d N$T |d YDX |d OCLCF |d CNCGM |d COO |d CUS |d MERER |d EZ9 |d U3W |d INT |d S9I |d TYFRS |d S2H |d UKAHL |d CRCPR |d OCLCO |d OCL |d OCLCO | ||
040 | |a DLC |b eng |e rda |c DLC |d EBLCP |d NT |d YDX |d OCLCF |d CNCGM |d COO |d CUS |d MERER |d EZ9 |d U3W |d INT |d S9I |d TYFRS |d S2H |d UKAHL |d CRCPR |d OCLCO |d OCL | ||
049 | |a ZCUA | ||
050 | 0 | 0 | |a TA1636 |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a COM083000 |2 bisacsh | |
072 | 7 | |a TEC015000 |2 bisacsh | |
082 | 0 | 0 | |a 005.8/24 |2 23 |
100 | 1 | |a Shivani, Shivendra, |e author | |
245 | 1 | 0 | |a Handbook of image-based security techniques / |c Shivendra Shivani, Suneeta Agarwal, and Jasjit S. Suri |
246 | 3 | 0 | |a Image-based security techniques |
264 | 1 | |a Boca Raton : |b CRC Press, Taylor and Francis Group, CRC Press, is an imprint of the Taylor and Francis an informa business, |c [2018] | |
264 | 1 | |a Boca Raton : |b CRC Press, |c 2018 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome |2 rdacc | ||
347 | |a data file |2 rda | ||
347 | |a text file |2 rdaft | ||
504 | |a Includes bibliographical references and index | ||
504 | |a Includes index | ||
505 | 0 | |a Cover; Half Title; Title; Copyright; Dedication; Contents; Foreword; Preface; Authors; Section I Visual Cryptography; Chapter 1 Visual Cryptography: Introduction; 1.1 INTRODUCTION; 1.2 VISUAL CRYPTOGRAPHY; 1.3 APPLICATIONS OF VISUAL CRYPTOGRAPHY; 1.3.1 Trojan-Free Secure Transaction; 1.3.2 Authentication; 1.3.3 Access Control; 1.3.4 Transaction Tracking; 1.3.5 Watermarking; 1.4 PRELIMINARIES; 1.5 FUNDAMENTAL PRINCIPLES OF VISUAL SECRET SHARING; 1.5.1 Pixels Expansion m; 1.5.2 Contrast; 1.5.3 Basis Matrices; 1.5.4 Concept of Black and White Pixels in Visual Cryptography | |
505 | 8 | |a 1.6 FORMATION OF A BASIS MATRIX1.6.1 Observations Related to The Basis Matrix Creation Approach of Naor and Shamir; 1.6.2 Essential Conditions for a Basis Matrix; 1.7 DIFFERENT EVALUATION PARAMETERS; 1.7.1 Objective Evaluation Parameters; 1.7.2 Subjective Parameters; Chapter 2 Various Dimensions of Visual Cryptography; 2.1 VARIOUS DIMENSIONS OF VISUAL CRYPTOGRAPHY; 2.1.1 Traditional Visual Cryptography (TVC); 2.1.1.1 Threshold visual cryptography; 2.1.2 Extended Visual Cryptography (EVC); 2.1.2.1 Halftone visual cryptography (HVC); 2.1.2.2 Signi cance of a halftone image over a binary image | |
505 | 8 | |a 2.1.2.3 Halftone image creation using error di usion2.1.2.4 Tagged visual cryptography (TVC); 2.1.2.5 Friendly visual cryptography (FVC); 2.1.2.6 Size invariant visual cryptography; 2.1.2.7 Progressive visual cryptography (PVC); 2.1.2.8 Progressive visual cryptography with meaningful shares without pixel expan- sion; 2.1.3 Dynamic Visual Cryptography (DVC); 2.1.3.1 Multitone/Continuous tone visual cryptography (MVC); 2.1.3.2 MVC with unexpanded meaningful shares; 2.1.3.3 Perfect recovery of the secret image in MVC | |
505 | 8 | |a 2.1.3.4 Visual cryptography with multiple se- crets or multi secret sharing (MSS)2.1.3.5 Angle restriction problem in MSS; 2.1.3.6 Multi secret sharing with unexpanded meaningful shares; 2.1.3.7 XOR-based visual cryptography; 2.1.3.8 Hybrid approach with XOR-based VC, multitone VC, FVC, size invariant VC and multi secret sharing; 2.1.3.9 Veri able visual cryptography (VVC); 2.1.3.10 Hybrid approach with VVC; 2.1.3.11 Random grid-based visual cryptography (RGVC); 2.1.3.12 Hybrid approaches using RGVC; Chapter 3 VC Approaches with Computationless Recovery of Secrets | |
505 | 8 | |a 3.1 COMPUTATIONLESS AND COMPUTATIONƯBASED VISUAL CRYPTOGRAPHY APPROACHES3.2 BASICS FOR THE DEVELOPMENT OF COMPUTATIONƯLESS VC APPROACHES; 3.2.1 Development of Threshold Visual Cryptography; 3.2.2 Development of a Halftone Visual Cryptography (HVC) Scheme; 3.2.3 Development of a Friendly Visual Cryptography (FVC) Scheme; 3.2.4 Development of Size Invariant Visual Cryptography; 3.2.4.1 Preprocessing of secret image for size invariant visual cryptography; 3.2.4.2 Size invariant share generation with the help of the preprocessed secret | |
506 | |a Taylor & Francis eBooks Multi-User |f TAFUU | ||
520 | |a This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB-- |c Provided by publisher | ||
588 | |a Description based on print version record | ||
588 | 0 | |a Print version record | |
650 | 0 | |a Data encryption (Computer science) |v Handbooks, manuals, etc |0 https://id.loc.gov/authorities/subjects/sh99001300 | |
650 | 0 | |a Data encryption (Computer science) |v Handbooks, manuals, etc | |
650 | 0 | |a Digital video |x Security measures |0 https://id.loc.gov/authorities/subjects/sh99005297 |v Handbooks, manuals, etc |0 https://id.loc.gov/authorities/subjects/sh99001300 | |
650 | 0 | |a Digital video |x Security measures |v Handbooks, manuals, etc | |
650 | 0 | |a Image files |x Security measures |0 https://id.loc.gov/authorities/subjects/sh99005297 |v Handbooks, manuals, etc |0 https://id.loc.gov/authorities/subjects/sh99001300 | |
650 | 0 | |a Image files |x Security measures |v Handbooks, manuals, etc | |
650 | 6 | |a Chiffrement (Informatique) |v Guides, manuels, etc | |
650 | 6 | |a Fichiers d'images |x Sécurité |x Mesures |v Guides, manuels, etc | |
650 | 6 | |a Vidéo numérique |x Sécurité |x Mesures |v Guides, manuels, etc | |
650 | 7 | |a COMPUTERS |x Security |x General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Image processing |2 fast | |
655 | 0 | |a Electronic books | |
655 | 4 | |a Electronic books | |
655 | 7 | |a Electronic books |2 lcgft | |
655 | 7 | |a Handbooks and manuals |2 fast | |
700 | 1 | |a Agarwal, Suneeta, |e author | |
700 | 1 | |a Suri, Jasjit S., |e author | |
710 | 2 | |a Taylor & Francis | |
776 | 0 | 8 | |i Print version: |a Shivani, Shivendra, author |t Handbook of image-based security techniques |d Boca Raton : CRC Press, Taylor & Francis Group, CRC Press, is an imprint of the Taylor & Francis an informa business, [2018] |z 9781138054219 (acid-free paper) |w (DLC) 2018005156 |
776 | 0 | 8 | |i Print version: |a Shivani, Shivendra, |t Handbook of image-based security techniques /. |a Shivani, Shivendra. |t Handbook of image-based security techniques. |d Boca Raton : Taylor & Francis, CRC Press, 2018 |z 9781138054219 |w (DLC) 2018005156 |
999 | 1 | 0 | |i ca82adad-b36b-4616-8a5f-ba75d035ba2d |l 990083421930108501 |s US-NCD |m handbook_of_image_based_security_techniques________________________________2018_______crcpra________________________________________shivani__shivendra_________________e |
999 | 1 | 0 | |i ca82adad-b36b-4616-8a5f-ba75d035ba2d |l 15132078 |s US-NNC |m handbook_of_image_based_security_techniques________________________________2018_______crcpra________________________________________shivani__shivendra_________________e |
999 | 1 | 1 | |l 15132078 |s ISIL:US-NNC |t BKS |a lweb |c EBOOKS |p UNLOANABLE |