Visual cryptography for image processing and security: theory, methods and applications
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV045335688 | ||
003 | DE-604 | ||
005 | 20190925 | ||
007 | cr|uuu---uuuuu | ||
008 | 181204s2014 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319096445 |c Online |9 978-3-319-09644-5 | ||
024 | 7 | |a 10.1007/978-3-319-09644-5 |2 doi | |
035 | |a (ZDB-2-SCS)9783319096445 | ||
035 | |a (OCoLC)890776371 | ||
035 | |a (DE-599)BVBBV045335688 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-739 |a DE-634 |a DE-92 |a DE-522 |a DE-860 |a DE-355 | ||
082 | 0 | |a 006.37 |2 23 | |
082 | 0 | |a 006.6 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Liu, Feng |e Verfasser |0 (DE-588)1088798977 |4 aut | |
245 | 1 | 0 | |a Visual cryptography for image processing and security |b theory, methods and applications |c Feng Liu, Wei Qi Yan |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
300 | |a 1 Online-Ressource (XVI, 145 Seiten) |b 49 Illustrationen, 6 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Computer vision | |
650 | 4 | |a Computer security | |
650 | 4 | |a Coding theory | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierung |0 (DE-588)4070059-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Codierung |0 (DE-588)4070059-8 |D s |
689 | 0 | 3 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yan, Wei Qi |e Verfasser |0 (DE-588)1120154391 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-09643-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-09645-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-09644-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030722465 | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09644-5 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818984775157809152 |
---|---|
any_adam_object | |
author | Liu, Feng Yan, Wei Qi |
author_GND | (DE-588)1088798977 (DE-588)1120154391 |
author_facet | Liu, Feng Yan, Wei Qi |
author_role | aut aut |
author_sort | Liu, Feng |
author_variant | f l fl w q y wq wqy |
building | Verbundindex |
bvnumber | BV045335688 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783319096445 (OCoLC)890776371 (DE-599)BVBBV045335688 |
dewey-full | 006.37 006.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.37 006.6 |
dewey-search | 006.37 006.6 |
dewey-sort | 16.37 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-09644-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03961nam a2200793zc 4500</leader><controlfield tag="001">BV045335688</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190925 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181204s2014 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319096445</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-09644-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-09644-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319096445</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890776371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045335688</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.37</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Feng</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1088798977</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Visual cryptography for image processing and security</subfield><subfield code="b">theory, methods and applications</subfield><subfield code="c">Feng Liu, Wei Qi Yan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 145 Seiten)</subfield><subfield code="b">49 Illustrationen, 6 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Wei Qi</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1120154391</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-09643-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-09645-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030722465</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09644-5</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045335688 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:24:21Z |
institution | BVB |
isbn | 9783319096445 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030722465 |
oclc_num | 890776371 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-Aug4 DE-861 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-739 DE-634 DE-92 DE-522 DE-860 DE-355 DE-BY-UBR |
owner_facet | DE-19 DE-BY-UBM DE-Aug4 DE-861 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-739 DE-634 DE-92 DE-522 DE-860 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVI, 145 Seiten) 49 Illustrationen, 6 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spelling | Liu, Feng Verfasser (DE-588)1088798977 aut Visual cryptography for image processing and security theory, methods and applications Feng Liu, Wei Qi Yan Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] 1 Online-Ressource (XVI, 145 Seiten) 49 Illustrationen, 6 Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Computer vision Computer security Coding theory Kryptosystem (DE-588)4209132-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Maschinelles Sehen (DE-588)4129594-8 gnd rswk-swf Codierung (DE-588)4070059-8 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Codierung (DE-588)4070059-8 s Maschinelles Sehen (DE-588)4129594-8 s Kryptosystem (DE-588)4209132-9 s DE-604 Yan, Wei Qi Verfasser (DE-588)1120154391 aut Erscheint auch als Druck-Ausgabe 978-3-319-09643-8 Erscheint auch als Druck-Ausgabe 978-3-319-09645-2 https://doi.org/10.1007/978-3-319-09644-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Liu, Feng Yan, Wei Qi Visual cryptography for image processing and security theory, methods and applications Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Computer vision Computer security Coding theory Kryptosystem (DE-588)4209132-9 gnd Datenschutz (DE-588)4011134-9 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Codierung (DE-588)4070059-8 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4011134-9 (DE-588)4129594-8 (DE-588)4070059-8 (DE-588)4026894-9 |
title | Visual cryptography for image processing and security theory, methods and applications |
title_auth | Visual cryptography for image processing and security theory, methods and applications |
title_exact_search | Visual cryptography for image processing and security theory, methods and applications |
title_full | Visual cryptography for image processing and security theory, methods and applications Feng Liu, Wei Qi Yan |
title_fullStr | Visual cryptography for image processing and security theory, methods and applications Feng Liu, Wei Qi Yan |
title_full_unstemmed | Visual cryptography for image processing and security theory, methods and applications Feng Liu, Wei Qi Yan |
title_short | Visual cryptography for image processing and security |
title_sort | visual cryptography for image processing and security theory methods and applications |
title_sub | theory, methods and applications |
topic | Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Computer vision Computer security Coding theory Kryptosystem (DE-588)4209132-9 gnd Datenschutz (DE-588)4011134-9 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Codierung (DE-588)4070059-8 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Image Processing and Computer Vision Systems and Data Security Coding and Information Theory Computer vision Computer security Coding theory Kryptosystem Datenschutz Maschinelles Sehen Codierung Informatik |
url | https://doi.org/10.1007/978-3-319-09644-5 |
work_keys_str_mv | AT liufeng visualcryptographyforimageprocessingandsecuritytheorymethodsandapplications AT yanweiqi visualcryptographyforimageprocessingandsecuritytheorymethodsandapplications |