01610 a2200265 4500003000500000005001700005010001700022020002600039020002900065035002400094040000900118082001500127245009600142260004100238300004800279490004000327500000700367505076500374650004601139650003901185650003601224650004101260700002101301700002201322Nust20221020134753.0 a 2011029864 a143983721X (hardback) a9781439837214 (hardback) a(OCoLC)ocn475450986 cNust00a005.82,CIM00aVisual cryptography and secret image sharing / cedited by Stelvio Cimato, Ching-Nung Yang. aBoca Raton, FL :bCRC Press,cc2012. axxxvi, 501 p. :bill. (some col.) ;c24 cm.0 aDigital imaging and computer vision a,  a,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),g  0aComputer file sharingxSecurity measures. 0aData encryption (Computer science) 0aImage filesxSecurity measures. 0aImage processingxSecurity measures.1 aCimato, Stelvio.1 aYang, Ching-Nung.