Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209048 | ||
003 | DE-604 | ||
005 | 20190222 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 xx o|||| 00||| eng d | ||
020 | |a 9783319234731 |c Online |9 978-3-319-23473-1 | ||
024 | 7 | |a 10.1007/978-3-319-23473-1 |2 doi | |
035 | |a (OCoLC)929991694 | ||
035 | |a (DE-599)BVBBV043209048 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 006.6 |2 23 | |
082 | 0 | |a 006.37 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Liu, Feng |e Verfasser |0 (DE-588)1088798977 |4 aut | |
245 | 1 | 0 | |a Visual Cryptography for Image Processing and Security |b Theory, Methods, and Applications |c by Feng Liu, Wei Qi Yan |
250 | |a Second edition | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XVI, 167 p. 65 illus., 14 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Image processing | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierung |0 (DE-588)4070059-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Codierung |0 (DE-588)4070059-8 |D s |
689 | 0 | 3 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yan, Wei Qi |e Verfasser |0 (DE-588)1120154391 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-23472-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-23473-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028632209 | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23473-1 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819251725308002304 |
---|---|
adam_text | VISUAL CRYPTOGRAPHY FOR IMAGE PROCESSING AND SECURITY
/ LIU, FENG
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
VARIOUS PROBLEMS IN VISUAL CRYPTOGRAPHY
CHEATING PREVENTION OF VISUAL CRYPTOGRAPHY
VARIOUS VISUAL CRYPTOGRAPHY SCHEMES
VARIOUS COLOR SCHEMES OF VISUAL CRYPTOGRAPHY
VARIOUS APPLICATIONS OF VISUAL CRYPTOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
VISUAL CRYPTOGRAPHY FOR IMAGE PROCESSING AND SECURITY
/ LIU, FENG
: 2015
ABSTRACT / INHALTSTEXT
THIS UNIQUE TEXT/REFERENCE ADDRESSES THE FUNDAMENTAL CONCEPTS IN THE
THEORY AND PRACTICE OF VISUAL CRYPTOGRAPHY, A SECRET SHARING TECHNIQUE
WHICH ALLOWS THE ENCRYPTION OF AN IMAGE WITHOUT REQUIRING ANY COMPLEX
COMPUTATION OR KNOWLEDGE OF CRYPTOGRAPHY. THE DESIGN, CONSTRUCTION,
ANALYSIS, AND APPLICATION OF VISUAL CRYPTOGRAPHY SCHEMES (VCSS) ARE
DISCUSSED IN DETAIL. ORIGINAL, CUTTING-EDGE RESEARCH IS PRESENTED ON
PROBABILISTIC, SIZE INVARIANT, THRESHOLD, CONCOLOROUS, AND CHEATING
IMMUNE VCS. THIS UPDATED SECOND EDITION HAS ALSO BEEN EXPANDED WITH NEW
CONTENT ON BRAILLE AND 2D BARCODE AUTHENTICATION OF VISUAL CRYPTOGRAPHY
SHARES. TOPICS AND FEATURES: • CONTAINS REVIEW EXERCISES AT THE END OF
EACH CHAPTER, AS WELL AS A HELPFUL GLOSSARY (NEW) • PROVIDES A
THOROUGH INTRODUCTION TO THE FIELD OF VISUAL CRYPTOGRAPHY • EXAMINES
VARIOUS COMMON PROBLEMS IN VISUAL CRYPTOGRAPHY, INCLUDING THE ALIGNMENT,
FLIPPING, CHEATING, DISTORTION, AND THIN LINE PROBLEMS • REVIEWS A
RANGE OF VISUAL CRYPTOGRAPHY SCHEMES, INCLUDING XOR-BASED VISUAL
CRYPTOGRAPHY AND SECURITY ENRICHED VCS • DESCRIBES DIFFERENT METHODS
FOR PRESENTING COLOR CONTENT USING VISUAL CRYPTOGRAPHIC TECHNIQUES •
COVERS SUCH APPLICATIONS OF VISUAL CRYPTOGRAPHY AS WATERMARKING,
RESOLUTION VARIANT VCS, AND MULTIPLE RESOLUTION VCS THIS
LOGICALLY-STRUCTURED AND COMPREHENSIVE WORK WILL SERVE AS A HELPFUL
REFERENCE FOR ALL RESEARCHERS AND STUDENTS INTERESTED IN DO
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Liu, Feng Yan, Wei Qi |
author_GND | (DE-588)1088798977 (DE-588)1120154391 |
author_facet | Liu, Feng Yan, Wei Qi |
author_role | aut aut |
author_sort | Liu, Feng |
author_variant | f l fl w q y wq wqy |
building | Verbundindex |
bvnumber | BV043209048 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)929991694 (DE-599)BVBBV043209048 |
dewey-full | 006.6 006.37 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.6 006.37 |
dewey-search | 006.6 006.37 |
dewey-sort | 16.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-23473-1 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04336nam a2200829zc 4500</leader><controlfield tag="001">BV043209048</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190222 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319234731</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-23473-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-23473-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)929991694</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209048</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.37</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Feng</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1088798977</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Visual Cryptography for Image Processing and Security</subfield><subfield code="b">Theory, Methods, and Applications</subfield><subfield code="c">by Feng Liu, Wei Qi Yan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 167 p. 65 illus., 14 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Wei Qi</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1120154391</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-23472-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632209</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23473-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209048 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:31:12Z |
institution | BVB |
isbn | 9783319234731 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632209 |
oclc_num | 929991694 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XVI, 167 p. 65 illus., 14 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
spellingShingle | Liu, Feng Yan, Wei Qi Visual Cryptography for Image Processing and Security Theory, Methods, and Applications Computer science Computer security Coding theory Image processing Computer Science Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Informatik Maschinelles Sehen (DE-588)4129594-8 gnd Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Datenschutz (DE-588)4011134-9 gnd Codierung (DE-588)4070059-8 gnd |
subject_GND | (DE-588)4129594-8 (DE-588)4026894-9 (DE-588)4209132-9 (DE-588)4011134-9 (DE-588)4070059-8 |
title | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications |
title_auth | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications |
title_exact_search | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications |
title_full | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications by Feng Liu, Wei Qi Yan |
title_fullStr | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications by Feng Liu, Wei Qi Yan |
title_full_unstemmed | Visual Cryptography for Image Processing and Security Theory, Methods, and Applications by Feng Liu, Wei Qi Yan |
title_short | Visual Cryptography for Image Processing and Security |
title_sort | visual cryptography for image processing and security theory methods and applications |
title_sub | Theory, Methods, and Applications |
topic | Computer science Computer security Coding theory Image processing Computer Science Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Informatik Maschinelles Sehen (DE-588)4129594-8 gnd Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Datenschutz (DE-588)4011134-9 gnd Codierung (DE-588)4070059-8 gnd |
topic_facet | Computer science Computer security Coding theory Image processing Computer Science Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Informatik Maschinelles Sehen Kryptosystem Datenschutz Codierung |
url | https://doi.org/10.1007/978-3-319-23473-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632209&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT liufeng visualcryptographyforimageprocessingandsecuritytheorymethodsandapplications AT yanweiqi visualcryptographyforimageprocessingandsecuritytheorymethodsandapplications |