Handbook of image-based security techniques /

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for...

Full description

Bibliographic Details
Main Authors: Shivani, Shivendra (Author), Agarwal, Suneeta (Author), Suri, Jasjit S. (Author)
Corporate Author: Taylor & Francis
Format: Book
Language:English
Published: Boca Raton : CRC Press, Taylor and Francis Group, CRC Press, is an imprint of the Taylor and Francis an informa business, [2018]
Boca Raton : CRC Press, 2018
Subjects:
LEADER 08249nam a2200961 i 4500
001 ca82adad-b36b-4616-8a5f-ba75d035ba2d
005 20240728000000.0
008 180309s2018 flu o f 001 0 eng
010 |a  2020691561 
010 |a 2020691561 
019 |a 1037351971  |a 1048765870  |a 1289813117 
020 |a 1315166968 
020 |a 1351681559 
020 |a 1351681567 
020 |a 9781315166964  |q (e-book) 
020 |a 9781351681551  |q ebook 
020 |a 9781351681568  |q (e-book ;  |q PDF) 
020 |z 1138054216 
020 |z 9781138054219  |q acid-free paper 
024 7 |a 10.1201/9781315166964  |2 doi 
035 |a (NNC)15132078 
035 |a (NcD)008342193DUK01 
035 |a (OCoLC)1033537393  |z (OCoLC)1037351971  |z (OCoLC)1048765870  |z (OCoLC)1289813117 
035 |a (OCoLC)on1033537393 
035 |a 1033537393 
040 |a DLC  |b eng  |e rda  |c DLC  |d EBLCP  |d N$T  |d YDX  |d OCLCF  |d CNCGM  |d COO  |d CUS  |d MERER  |d EZ9  |d U3W  |d INT  |d S9I  |d TYFRS  |d S2H  |d UKAHL  |d CRCPR  |d OCLCO  |d OCL  |d OCLCO 
040 |a DLC  |b eng  |e rda  |c DLC  |d EBLCP  |d NT  |d YDX  |d OCLCF  |d CNCGM  |d COO  |d CUS  |d MERER  |d EZ9  |d U3W  |d INT  |d S9I  |d TYFRS  |d S2H  |d UKAHL  |d CRCPR  |d OCLCO  |d OCL 
049 |a ZCUA 
050 0 0 |a TA1636 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
072 7 |a COM083000  |2 bisacsh 
072 7 |a TEC015000  |2 bisacsh 
082 0 0 |a 005.8/24  |2 23 
100 1 |a Shivani, Shivendra,  |e author 
245 1 0 |a Handbook of image-based security techniques /  |c Shivendra Shivani, Suneeta Agarwal, and Jasjit S. Suri 
246 3 0 |a Image-based security techniques 
264 1 |a Boca Raton :  |b CRC Press, Taylor and Francis Group, CRC Press, is an imprint of the Taylor and Francis an informa business,  |c [2018] 
264 1 |a Boca Raton :  |b CRC Press,  |c 2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome  |2 rdacc 
347 |a data file  |2 rda 
347 |a text file  |2 rdaft 
504 |a Includes bibliographical references and index 
504 |a Includes index 
505 0 |a Cover; Half Title; Title; Copyright; Dedication; Contents; Foreword; Preface; Authors; Section I Visual Cryptography; Chapter 1 Visual Cryptography: Introduction; 1.1 INTRODUCTION; 1.2 VISUAL CRYPTOGRAPHY; 1.3 APPLICATIONS OF VISUAL CRYPTOGRAPHY; 1.3.1 Trojan-Free Secure Transaction; 1.3.2 Authentication; 1.3.3 Access Control; 1.3.4 Transaction Tracking; 1.3.5 Watermarking; 1.4 PRELIMINARIES; 1.5 FUNDAMENTAL PRINCIPLES OF VISUAL SECRET SHARING; 1.5.1 Pixels Expansion m; 1.5.2 Contrast; 1.5.3 Basis Matrices; 1.5.4 Concept of Black and White Pixels in Visual Cryptography 
505 8 |a 1.6 FORMATION OF A BASIS MATRIX1.6.1 Observations Related to The Basis Matrix Creation Approach of Naor and Shamir; 1.6.2 Essential Conditions for a Basis Matrix; 1.7 DIFFERENT EVALUATION PARAMETERS; 1.7.1 Objective Evaluation Parameters; 1.7.2 Subjective Parameters; Chapter 2 Various Dimensions of Visual Cryptography; 2.1 VARIOUS DIMENSIONS OF VISUAL CRYPTOGRAPHY; 2.1.1 Traditional Visual Cryptography (TVC); 2.1.1.1 Threshold visual cryptography; 2.1.2 Extended Visual Cryptography (EVC); 2.1.2.1 Halftone visual cryptography (HVC); 2.1.2.2 Signi cance of a halftone image over a binary image 
505 8 |a 2.1.2.3 Halftone image creation using error di usion2.1.2.4 Tagged visual cryptography (TVC); 2.1.2.5 Friendly visual cryptography (FVC); 2.1.2.6 Size invariant visual cryptography; 2.1.2.7 Progressive visual cryptography (PVC); 2.1.2.8 Progressive visual cryptography with meaningful shares without pixel expan- sion; 2.1.3 Dynamic Visual Cryptography (DVC); 2.1.3.1 Multitone/Continuous tone visual cryptography (MVC); 2.1.3.2 MVC with unexpanded meaningful shares; 2.1.3.3 Perfect recovery of the secret image in MVC 
505 8 |a 2.1.3.4 Visual cryptography with multiple se- crets or multi secret sharing (MSS)2.1.3.5 Angle restriction problem in MSS; 2.1.3.6 Multi secret sharing with unexpanded meaningful shares; 2.1.3.7 XOR-based visual cryptography; 2.1.3.8 Hybrid approach with XOR-based VC, multitone VC, FVC, size invariant VC and multi secret sharing; 2.1.3.9 Veri able visual cryptography (VVC); 2.1.3.10 Hybrid approach with VVC; 2.1.3.11 Random grid-based visual cryptography (RGVC); 2.1.3.12 Hybrid approaches using RGVC; Chapter 3 VC Approaches with Computationless Recovery of Secrets 
505 8 |a 3.1 COMPUTATIONLESS AND COMPUTATIONƯBASED VISUAL CRYPTOGRAPHY APPROACHES3.2 BASICS FOR THE DEVELOPMENT OF COMPUTATIONƯLESS VC APPROACHES; 3.2.1 Development of Threshold Visual Cryptography; 3.2.2 Development of a Halftone Visual Cryptography (HVC) Scheme; 3.2.3 Development of a Friendly Visual Cryptography (FVC) Scheme; 3.2.4 Development of Size Invariant Visual Cryptography; 3.2.4.1 Preprocessing of secret image for size invariant visual cryptography; 3.2.4.2 Size invariant share generation with the help of the preprocessed secret 
506 |a Taylor & Francis eBooks Multi-User  |f TAFUU 
520 |a This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB--  |c Provided by publisher 
588 |a Description based on print version record 
588 0 |a Print version record 
650 0 |a Data encryption (Computer science)  |v Handbooks, manuals, etc  |0 https://id.loc.gov/authorities/subjects/sh99001300 
650 0 |a Data encryption (Computer science)  |v Handbooks, manuals, etc 
650 0 |a Digital video  |x Security measures  |0 https://id.loc.gov/authorities/subjects/sh99005297  |v Handbooks, manuals, etc  |0 https://id.loc.gov/authorities/subjects/sh99001300 
650 0 |a Digital video  |x Security measures  |v Handbooks, manuals, etc 
650 0 |a Image files  |x Security measures  |0 https://id.loc.gov/authorities/subjects/sh99005297  |v Handbooks, manuals, etc  |0 https://id.loc.gov/authorities/subjects/sh99001300 
650 0 |a Image files  |x Security measures  |v Handbooks, manuals, etc 
650 6 |a Chiffrement (Informatique)  |v Guides, manuels, etc 
650 6 |a Fichiers d'images  |x Sécurité  |x Mesures  |v Guides, manuels, etc 
650 6 |a Vidéo numérique  |x Sécurité  |x Mesures  |v Guides, manuels, etc 
650 7 |a COMPUTERS  |x Security  |x General  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Image processing  |2 fast 
655 0 |a Electronic books 
655 4 |a Electronic books 
655 7 |a Electronic books  |2 lcgft 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Agarwal, Suneeta,  |e author 
700 1 |a Suri, Jasjit S.,  |e author 
710 2 |a Taylor & Francis 
776 0 8 |i Print version:  |a Shivani, Shivendra, author  |t Handbook of image-based security techniques  |d Boca Raton : CRC Press, Taylor & Francis Group, CRC Press, is an imprint of the Taylor & Francis an informa business, [2018]  |z 9781138054219 (acid-free paper)  |w (DLC) 2018005156 
776 0 8 |i Print version:  |a Shivani, Shivendra,  |t Handbook of image-based security techniques /.  |a Shivani, Shivendra.  |t Handbook of image-based security techniques.  |d Boca Raton : Taylor & Francis, CRC Press, 2018  |z 9781138054219  |w (DLC) 2018005156 
999 1 0 |i ca82adad-b36b-4616-8a5f-ba75d035ba2d  |l 990083421930108501  |s US-NCD  |m handbook_of_image_based_security_techniques________________________________2018_______crcpra________________________________________shivani__shivendra_________________e 
999 1 0 |i ca82adad-b36b-4616-8a5f-ba75d035ba2d  |l 15132078  |s US-NNC  |m handbook_of_image_based_security_techniques________________________________2018_______crcpra________________________________________shivani__shivendra_________________e 
999 1 1 |l 15132078  |s ISIL:US-NNC  |t BKS  |a lweb  |c EBOOKS  |p UNLOANABLE