000 01724 a2200289 4500
003 Nust
005 20221020134753.0
010 _a 2011029864
020 _a143983721X (hardback)
020 _a9781439837214 (hardback)
035 _a(OCoLC)ocn475450986
040 _cNust
082 0 0 _a005.82,CIM
245 0 0 _aVisual cryptography and secret image sharing /
_cedited by Stelvio Cimato, Ching-Nung Yang.
260 _aBoca Raton, FL :
_bCRC Press,
_cc2012.
300 _axxxvi, 501 p. :
_bill. (some col.) ;
_c24 cm.
490 0 _aDigital imaging and computer vision
500 _a,
505 _a,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463),
_g
650 0 _aComputer file sharing
_xSecurity measures.
_9100995
650 0 _aData encryption (Computer science)
_929166
650 0 _aImage files
_xSecurity measures.
_9100996
650 0 _aImage processing
_xSecurity measures.
_9100997
700 1 _aCimato, Stelvio.
_9100968
700 1 _aYang, Ching-Nung.
_9100998
942 _2ddc
_cBK
_k005.82,CIM
999 _c189272
_d189272