Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2012
|
Schriftenreihe: | Digital imaging and computer vision series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781439837221/?ar |
Zusammenfassung: | "With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"-- |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 online resource (xxxvi, 501 pages) illustrations (some color) |
ISBN: | 9781439837221 1439837228 1283311631 9781283311632 9781315217659 1315217651 9781351824859 1351824856 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047578505 | ||
003 | DE-627-1 | ||
005 | 20240228114822.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781439837221 |c electronic bk. |9 978-1-4398-3722-1 | ||
020 | |a 1439837228 |c electronic bk. |9 1-4398-3722-8 | ||
020 | |a 1283311631 |9 1-283-31163-1 | ||
020 | |a 9781283311632 |9 978-1-283-31163-2 | ||
020 | |a 9781315217659 |9 978-1-315-21765-9 | ||
020 | |a 1315217651 |9 1-315-21765-1 | ||
020 | |a 9781351824859 |9 978-1-351-82485-9 | ||
020 | |a 1351824856 |9 1-351-82485-6 | ||
035 | |a (DE-627-1)047578505 | ||
035 | |a (DE-599)KEP047578505 | ||
035 | |a (ORHE)9781439837221 | ||
035 | |a (DE-627-1)047578505 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a PBCD |2 bicssc | |
082 | 0 | |a 005.8/2 |2 23 | |
245 | 0 | 0 | |a Visual cryptography and secret image sharing |c edited by Stelvio Cimato, Ching-Nung Yang |
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2012 | |
300 | |a 1 online resource (xxxvi, 501 pages) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Digital imaging and computer vision series | |
500 | |a Includes bibliographical references and index | ||
520 | |a "With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"-- | ||
650 | 0 | |a Image processing |x Security measures | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Computer file sharing |x Security measures | |
650 | 0 | |a Image files |x Security measures | |
650 | 4 | |a Traitement d'images ; Sécurité ; Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Partage de fichiers (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Fichiers d'images ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Cimato, Stelvio |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yang, Ching-Nung |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781439837214 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781439837214 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781439837221/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047578505 |
---|---|
_version_ | 1833357084015460352 |
adam_text | |
any_adam_object | |
author2 | Cimato, Stelvio Yang, Ching-Nung |
author2_role | ctb ctb |
author2_variant | s c sc c n y cny |
author_facet | Cimato, Stelvio Yang, Ching-Nung |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047578505 (DE-599)KEP047578505 (ORHE)9781439837221 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04146cam a22006132c 4500</leader><controlfield tag="001">ZDB-30-ORH-047578505</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114822.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439837221</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4398-3722-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439837228</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4398-3722-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283311631</subfield><subfield code="9">1-283-31163-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283311632</subfield><subfield code="9">978-1-283-31163-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315217659</subfield><subfield code="9">978-1-315-21765-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315217651</subfield><subfield code="9">1-315-21765-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351824859</subfield><subfield code="9">978-1-351-82485-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1351824856</subfield><subfield code="9">1-351-82485-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047578505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047578505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781439837221</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047578505</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">PBCD</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Visual cryptography and secret image sharing</subfield><subfield code="c">edited by Stelvio Cimato, Ching-Nung Yang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxvi, 501 pages)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Digital imaging and computer vision series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Image processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer file sharing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Image files</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Traitement d'images ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Partage de fichiers (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fichiers d'images ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cimato, Stelvio</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Ching-Nung</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781439837214</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781439837214</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781439837221/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047578505 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:03Z |
institution | BVB |
isbn | 9781439837221 1439837228 1283311631 9781283311632 9781315217659 1315217651 9781351824859 1351824856 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xxxvi, 501 pages) illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | CRC Press |
record_format | marc |
series2 | Digital imaging and computer vision series |
spelling | Visual cryptography and secret image sharing edited by Stelvio Cimato, Ching-Nung Yang Boca Raton, FL CRC Press 2012 1 online resource (xxxvi, 501 pages) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Digital imaging and computer vision series Includes bibliographical references and index "With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"-- Image processing Security measures Data encryption (Computer science) Computer file sharing Security measures Image files Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Partage de fichiers (Informatique) ; Sécurité ; Mesures Fichiers d'images ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography Cimato, Stelvio MitwirkendeR ctb Yang, Ching-Nung MitwirkendeR ctb 9781439837214 Erscheint auch als Druck-Ausgabe 9781439837214 |
spellingShingle | Visual cryptography and secret image sharing Image processing Security measures Data encryption (Computer science) Computer file sharing Security measures Image files Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Partage de fichiers (Informatique) ; Sécurité ; Mesures Fichiers d'images ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography |
title | Visual cryptography and secret image sharing |
title_auth | Visual cryptography and secret image sharing |
title_exact_search | Visual cryptography and secret image sharing |
title_full | Visual cryptography and secret image sharing edited by Stelvio Cimato, Ching-Nung Yang |
title_fullStr | Visual cryptography and secret image sharing edited by Stelvio Cimato, Ching-Nung Yang |
title_full_unstemmed | Visual cryptography and secret image sharing edited by Stelvio Cimato, Ching-Nung Yang |
title_short | Visual cryptography and secret image sharing |
title_sort | visual cryptography and secret image sharing |
topic | Image processing Security measures Data encryption (Computer science) Computer file sharing Security measures Image files Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Partage de fichiers (Informatique) ; Sécurité ; Mesures Fichiers d'images ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography |
topic_facet | Image processing Security measures Data encryption (Computer science) Computer file sharing Security measures Image files Security measures Traitement d'images ; Sécurité ; Mesures Chiffrement (Informatique) Partage de fichiers (Informatique) ; Sécurité ; Mesures Fichiers d'images ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography |
work_keys_str_mv | AT cimatostelvio visualcryptographyandsecretimagesharing AT yangchingnung visualcryptographyandsecretimagesharing |