<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01724    a2200289   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20221020134753.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2011029864</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">143983721X (hardback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781439837214 (hardback)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)ocn475450986</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.82,CIM</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Visual cryptography and secret image sharing / </subfield>
    <subfield code="c">edited by Stelvio Cimato, Ching-Nung Yang.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boca Raton, FL :</subfield>
    <subfield code="b">CRC Press,</subfield>
    <subfield code="c">c2012.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxxvi, 501 p. :</subfield>
    <subfield code="b">ill. (some col.) ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
    <subfield code="a">Digital imaging and computer vision</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">, </subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),</subfield>
    <subfield code="g"> </subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer file sharing</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">100995</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Data encryption (Computer science)</subfield>
    <subfield code="9">29166</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Image files</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">100996</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Image processing</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">100997</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Cimato, Stelvio.</subfield>
    <subfield code="9">100968</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Yang, Ching-Nung.</subfield>
    <subfield code="9">100998</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
    <subfield code="k">005.82,CIM</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">189272</subfield>
    <subfield code="d">189272</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">GEN</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">1</subfield>
    <subfield code="o">005.82,CIM</subfield>
    <subfield code="p">MCS35071</subfield>
    <subfield code="r">2025-04-11</subfield>
    <subfield code="s">2024-07-30</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.9, Shelf No.4</subfield>
  </datafield>
</record>
