| 000 | 01724 a2200289 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20221020134753.0 | ||
| 010 | _a 2011029864 | ||
| 020 | _a143983721X (hardback) | ||
| 020 | _a9781439837214 (hardback) | ||
| 035 | _a(OCoLC)ocn475450986 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.82,CIM |
| 245 | 0 | 0 |
_aVisual cryptography and secret image sharing / _cedited by Stelvio Cimato, Ching-Nung Yang. |
| 260 |
_aBoca Raton, FL : _bCRC Press, _cc2012. |
||
| 300 |
_axxxvi, 501 p. : _bill. (some col.) ; _c24 cm. |
||
| 490 | 0 | _aDigital imaging and computer vision | |
| 500 | _a, | ||
| 505 |
_a,Visual Cryptography From Halftone Error Diffusion (Page-1), Visual Cryptography For Color Images (Page-31), Visual Cryptography For Multiple Secrets (Page-57), Extended Visual Cryptography For Photograph Images (Page-95)Probabilistic Visual Cryptography Schemes (Page-127), XOR-Based Visual Cryptography (Page-155), Visual Cryptography And Random Grids (Page-185), Visual Cryptography And Contrast Bounds (Page-223), Visual Cryptography Schemes (Page-255), Cheating Prevention In Visual Cryptography (Page-281)With Reversing Resolving The Alignment Problem In Visual Cryptography (Page-297), Applications Of Visual Cryptography (Page-329), Image Sharing With Steganography And Authentication (Page-425), Two-Decoding-Option Image Sharing Method (Page-463), _g |
||
| 650 | 0 |
_aComputer file sharing _xSecurity measures. _9100995 |
|
| 650 | 0 |
_aData encryption (Computer science) _929166 |
|
| 650 | 0 |
_aImage files _xSecurity measures. _9100996 |
|
| 650 | 0 |
_aImage processing _xSecurity measures. _9100997 |
|
| 700 | 1 |
_aCimato, Stelvio. _9100968 |
|
| 700 | 1 |
_aYang, Ching-Nung. _9100998 |
|
| 942 |
_2ddc _cBK _k005.82,CIM |
||
| 999 |
_c189272 _d189272 |
||