Visual cryptography and secret image sharing / (Record no. 189272)

000 -LEADER
fixed length control field 01724 a2200289 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221020134753.0
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011029864
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 143983721X (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439837214 (hardback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn475450986
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82,CIM
245 00 - TITLE STATEMENT
Title Visual cryptography and secret image sharing /
Statement of responsibility, etc. edited by Stelvio Cimato, Ching-Nung Yang.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxxvi, 501 p. :
Other physical details ill. (some col.) ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Digital imaging and computer vision
500 ## - GENERAL NOTE
General note ,
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note ,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),
Miscellaneous information
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer file sharing
General subdivision Security measures.
9 (RLIN) 100995
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
9 (RLIN) 29166
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Image files
General subdivision Security measures.
9 (RLIN) 100996
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Image processing
General subdivision Security measures.
9 (RLIN) 100997
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cimato, Stelvio.
9 (RLIN) 100968
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Ching-Nung.
9 (RLIN) 100998
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Call number prefix 005.82,CIM
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) General Stacks 12/12/2016 1 005.82,CIM MCS35071 04/11/2025 07/30/2024 12/12/2016 Book Almirah No.9, Shelf No.4
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.