Visual cryptography and secret image sharing / (Record no. 2951)

MARC details
000 -LEADER
fixed length control field 10581cam a2200205 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439837214 (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 143983721X (hardback)
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number CIM/V
245 00 - TITLE STATEMENT
Title Visual cryptography and secret image sharing /
Statement of responsibility, etc. edited by Stelvio Cimato, Ching-Nung Yang.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxxvi, 501 p. :
Other physical details ill. (some col.) ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Visual Cryptography from Halftone Error Diffusion<br/>Gonzalo R. Arce. Zhongmin Wang, and Giovanni Di Crescenzo<br/>1.1 Introduction<br/>1.1.1 Visual Cryptography<br/>1.1.2 Halftone Visual Cryptography<br/>1.1.3 Blue Noise Error Diffusion .<br/>1.2 Visual Secret Sharing<br/>1.2.1 Notion and Formal Definitions<br/>1.2.2 Construction of VSS Scheme .<br/>1.3 Halftone VSS Construction Using Error Diffusion<br/>1.3.1 Share Structure<br/>1.3.2 Distribution of SIPs and ABPs<br/>1.3.3 Generation of Halftone Shares via Error Diffusion<br/>1.4 Halftone VSS Construction Using Parallel Error Diffusion<br/>1.5 Quality of Halftone Shai'es<br/>1.6 Discussion<br/>1.6.1 Improvement ot image Quality .<br/>1.6.2 Comparison with Other Methods<br/>1.6.3 Image Decoding<br/>1.7 Simulation Results<br/>1.8 Conclusion<br/>Bibliography<br/>Visual Cryptography for Color Images<br/>Stelvio Cimato, Roberto De Frisco, and Alfredo De Santis<br/>2.1 Introduction<br/>2.2 Color Superposition<br/>2.2.1 Color Vision and Color Models<br/>2.2.2 Lattices .<br/>2.2.3 The Darkening Problem . .<br/>2.2.4 The Annihilator Color . . .<br/>2.2.5 The Identity Color<br/>2.3 Formal Models for Colored VCS<br/>2.3.1 The Models for B&W-VC<br/>2.3.2 The Models for Color-VC<br/>2.3.3 The SC, ND, and General Models<br/>2.3.4 Base Matrices . . . .<br/>2.4 Schemes for the SC Model<br/>2.4.1 The VV Schemes .<br/>2.4.2 The BDD Schemes<br/>2.4.3 The KY and YL Schemes<br/>2.4.4 The CDD Schemes and a Lower Bound<br/>2.5 Schemes for the ND Model . .<br/>2.6 Schemes for the General Model<br/>2.6.1 (2,2)-Threshold Schemes<br/>2.6.2 The (2, n)-Threshold AS Schemes .<br/>2.7 Other Schemes<br/>2.8 Conclusions . .<br/>Bibliography<br/>Visual Cryptography for Multiple Secrets<br/>Shyong Jian Shyu<br/>3.1 Introduction . . . o. • o u<br/>3.2 Naor and Shamir's Basic Visual Secret Sharing Scheme .<br/>3.3 Visual Two-Secret Sharing Schemes<br/>3.3.1 Wu and Chen's Scheme . .<br/>3.3.2 Wu and Chang's Scheme . .<br/>3.4 Visual Multiple-Secret Sharing Schemes<br/>3.4.1 Shyu et al.'s Scheme .<br/>3.4.1.1 Informal Description<br/>3.4.1.2 Encoding Circle Share A .<br/>3.4.1.3 Encoding Circle Share B<br/>3.4.1.4 General Algorithm .<br/>3.4.2 Feng et al.'s Scheme .<br/>3.4.3 Experimental Results<br/>3.4.4 Comparison and Discussions<br/>3.5 Concluding Remarks<br/>Bibliography .<br/>Extended Visual Cryptography for Photograph Images<br/>Yasushi Yamaguchi<br/>4 1 Introduction . •<br/>4 2 Basic Visual Cryptography Schemes .<br/>4 2 1 (fc, n) Visual Secret Sharing Schemes .<br/>4.2.2 Extended Visual Cryptography Scheme . .<br/>4.2.3 Random Grids<br/>4.3 Fundamentals of Photograph Visual Cryptography<br/>4.3.1 Digital Halftoning . .<br/>4.3.2 Image Quality and Related Parameters<br/>4.3.3 Photograph Visual Cryptography with Basic Schemes<br/>4.4 Variations of Photograph Visual Cryptography<br/>4.4.1 Approaches to Photograph Visual Cryptography<br/>4.4.2 Random-Dot Shadow Images .<br/>4.4.3 Similar Shadow Images . .<br/>4.4.4 Positive and Negative Shadow Images<br/>4.4.5 Error and Secret Diffusion . . .<br/>4.4.6 Simultaneous Iterative Search .<br/>4.4.7 Tone Adjustment<br/>4.4.8 Continuous-Tone Subpixel<br/>4.5 Misalignment-Tolerant Photograph Visual Cryptography<br/>4.5.1 Theory and Implementation .<br/>4.5.2 Results<br/>4.6 Conclusions . .<br/>Bibliography . . . .<br/>Probabilistic Visual Cryptography Schemes<br/>Stelvio Cimato, RobeHo De Frisco, and Alfredo De Santis<br/>5.1 Introduction<br/>5.2 Visual Cryptography Schemes .<br/>5.2.1 The Deterministic Model<br/>5.2.2 The Probabilistic Model .<br/>5.3 Canonical Probabilistic Schemes<br/>5.4 Probabilistic Schemes with No Pixel Expansion<br/>5.5 Trading Pixel Expansion with Probabilities .. .<br/>5.5.1 Probabilistic Schemes with Given Pixel Expansion .<br/>5 6 Constructing Probabilistic Schemes .<br/>5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel<br/>Expansion . . .<br/>5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel<br/>Expansion .<br/>5.7 Probabilistic Schemes with Boolean Operations<br/>5.7.1 (2,n) Scheme for Binary Images (Wang)<br/>5.7.2 (n,n) Scheme for Binary Images (Wang)<br/>5.8 Conclusions and Open Problems<br/>Bibliography<br/>6 XOR-Based Visual Cryptography<br/>Daoshun Wang and Lin Dong<br/>6.1 Introduction<br/>6.2 Preliminaries<br/>6.3 Visual Cryptography Scheme Using the Polarization of Light<br/>6.3.1 {2, n) Scheme<br/>6.3.2 (n. n) Scheme<br/>6.3.3 (ic, n) Scheme<br/>6.4 Visual Cryptography Scheme with Reversing<br/>6.4.1 {k, n) VC Scheme Using Cyclic-Shift Operation<br/>6.4.2 A Scheme for General Access Structure .<br/>6.5 Secret Sharing Scheme Using Boolean Operation<br/>6.5.1 {2, n) Scheme<br/>6.5.2 (n, n) Scheme<br/>6.5.3 {k, n) Scheme<br/>6.6 Conclusion<br/>Bibliography . .<br/>7 Visual Cryptography and Random Grids<br/>Shyong Man Shyu<br/>7.1 Introduction .<br/>7.2 Random Grids<br/>7.2.1 Random Pixel, Random Grid, and Average Light Ti-ans-<br/>mission<br/>7.2.2 Superimposition of Random Grids<br/>7.3 Visual Cryptograms of Random Grids . .<br/>7.3.1 Definition of VCRG .<br/>7.3.2 (2, 2)-VCRG Algorithms for Binary Images .<br/>7.3.3 Experiments for (2, 2)-VCRG .<br/>7.3.4 Definition of Light Contrast and Performance Evalu<br/>ation .<br/>7.3.5 Algorithms of (n, n)-VCRG for Binary Images<br/>7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color<br/>Images .<br/>7.3.7 Experiments for (n, n)-VCRG .<br/>7.4 Concluding Remarks<br/>Bibliography<br/>8 Visual Cryptography and Contrast Bounds<br/>Andreas Klein<br/>8.1 Introduction<br/>8.2 Preliminaries<br/>8.3 Approximate Inclusion Exclusion<br/>8.4 Designs and Codes .<br/>8.5 Optimal 3-out-of-n Schemes<br/>8.6 Asymptotic Optimal A>out-of-n Schemes<br/>8.7 Contrast Tiade-OfTs for Extended Visual Cryptography<br/>Schemes<br/>8.8 Enhancing the Contrast by Nonstandard Models<br/>8.9 Conclusion<br/>Bibliography . .<br/>9 Visual Cryptography Schemes with Reversing<br/>Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci<br/>9.1 Introduction<br/>9.2 Visual Cryptography Schemes<br/>9.2.1 (A:, A:)-Threshold Visual Cryptography Schemes<br/>9.2.2 Perfect Black Visual Cryptography Schemes . .<br/>9.3 Almost Ideal Contrast VCS with Reversing<br/>9.4 Ideal Contrast VCS with Reversing . . . .<br/>9.4.1 A Construction Using a Binary Secret Sharing Scheme<br/>9.4.2 Constructions Using Perfect Black VCSs .<br/>9.4.2.1 The Scheme by Cimato, De Santis, Ferrara,<br/>and Masucci .<br/>9.4.2.2 The Scheme by Hu and Tzeng<br/>9.4.2.3 The Scheme by Yang, Wang, and Chen<br/>9.4.2.4 Comparisons .<br/>9.4.3 A Construction Using a Nonperfect Black VCS .<br/>9.5 Conclusions<br/>Bibliography . .<br/>10 Cheating Prevention in Visual Cryptography<br/>Yu-Chi Chen, Gwoboa Homg, and Du-Shiau Tsai<br/>10.1 Introduction<br/>10.2 Preliminaries<br/>10.2.1 Visual Cryptography .<br/>10.2.2 Cheating in VC .<br/>10.3 Cheating Prevention Schemes<br/>10.3.1 HCTl and HCT2<br/>10.3.2 HT . .<br/>10.3.3 TCH .<br/>10.3.4 PSl and PS2<br/>10.4 Analysis of Cheating Prevention Schemes<br/>10.5 Conclusions<br/>Bibliography . .<br/>11 Resolving the Alignment Problem in Visual Cryptography<br/>Feng Liu<br/>11.1 Introduction<br/>11.2 Preliminaries<br/>11.3 Misalignment with Integer Number of Subpixels<br/>11.4 Misalignment with Less Than One Subpixel<br/>11.4.1 Shares with Slightly Misalignment Can Still Recover the<br/>Secret Image<br/>11.4.2 Large Subpixels Have Better Misalignment Tolerance .<br/>11.5 A Misalignment Tolerant VCS<br/>11.5.1 The Algorithm<br/>11.5.2 Simulations . .<br/>11.6 Conclusions and Discussions<br/>11.7 Acknowledgments<br/>Bibliography<br/>12 Applications of Visual Cryptography<br/>Bemd Borchert and Klaus Reinhardt<br/>12.1 Introduction .<br/>12.2 Trojan-Secure Confirmation of Transactions<br/>12.3 Trojan-Secure Authentication Using a PIN .<br/>12.4 Security versus Multiple Use<br/>12.5 Using Refraction<br/>12.6 Technical Problems Concerning Adjustment and Parallaxes .<br/>12.7 Voting with a Receipt Baised on visual cryptography<br/>12.8 Conclusion<br/>Bibliography . .<br/>13 Steganography in Halftone Images<br/>Oscar C. An, Yuanfang Guo, and John S. Ho<br/>13.1 Introduction<br/>13.2 A Review of Error Diffusion<br/>13.3 Data Hiding by Stochastic Error Diffusion (DHSED)<br/>13.4 Data Hiding by Conjugate Error Diffusion (DHCED)<br/>13.5 Performance Analysis<br/>13.6 Summary<br/>Bibliography . .<br/>14 Image Secret Sharing<br/>WeiQi Van, Jonathan Weir, and Mohan S. Kankanhalli<br/>14.1 Introduction .<br/>14.2 State of the Art<br/>14.3 Approaches for Image Sharing<br/>14.3.1 Shamir's Secret Sharing Scheme<br/>14.3.2 Color Image Sharing Based on the Lagrange Interpola<br/>tion<br/>14.3.3 Color Image Sharing Based on Moving Lines<br/>14.3.4 Improved Algorithm<br/>14.4 Experiment and Evaluation<br/>14.5 Conclusion<br/>Bibliography .<br/>15 Polynomial-Based Image Sharing<br/>Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen<br/>15.1 Introduction .<br/>15.2 Polynomial-Based Sharing Scheme . .<br/>15.2.1 Shamir's Secret Sharing Scheme<br/>15.2.2 Lagrange Interpolation Scheme<br/>15.3 Preliminaries and Related Works .<br/>15.3.1 Thien-Lin Scheme .<br/>15.3.2 Lin-Tsai Scheme . .<br/>15.3.3 Yang et al.'s Scheme<br/>15.3.4 Inverted Pattern LSB Scheme .<br/>15.3.5 Scalable Secret Image Sharing .<br/>15.4 Wang et al.'s Scheme . . . .<br/>15.4.1 Secret Image Sharing .<br/>15.4.2 Set-Up Authentication<br/>15.4.3 Main Algorithms<br/>15.5 Experimental Results .<br/>15.5.1 Fidelity Analysis<br/>15.5.2 Evaluating Authentication . . .<br/>15.6 Conclusions<br/>Bibliography . .<br/>16 Image Sharing with Steganography and Authentication<br/>Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang<br/>16.1 Introduction .<br/>16.2 Related Work<br/>16.2.1 Lin and Tsai's Scheme<br/>16.2.2 Yang et al.'s Scheme .<br/>16.2.3 Chang et al.'s Scheme<br/>16.3 Adopted Techniques in the Proposed Scheme<br/>16.3.1 Error Diffusion Technique<br/>16.3.2 Interpolation Technique .<br/>16.3.3 Canny Edge Detector. . .<br/>16.3.4 Edge Lookup Inverse Halftoning Technique<br/>16.3.5 Shamir Scheme for Secret Sharing .<br/>16.4 Proposed Scheme .<br/>16.4.1 Sharing and Embedding Phase . . .<br/>16.4.2 Reconstruction and Verifying Phase<br/>16.5 Experimental Results<br/>16.6 Conclusions<br/>Bibliography . .<br/>17 Two-Decoding-Option Image Sharing Method<br/>Ching-Nung Yang. Chuei-Bang Ciou. and Tse-Shih Chen<br/>17.1 Introduction<br/>17.2 Preliminaries<br/>17.2.1 PISSS<br/>17.2.2 VCS .<br/>17.3 Previous Works<br/>17.3.1 Jin et al.'s TiOISSS . .<br/>17.3.2 Lin and Lin's TiOISSS<br/>17.4 A New (fe, n)-TiOISSS .<br/>17.4.1 Design Concept .<br/>17.4.2 The Lossless TiOISSS<br/>17.5 Experimental Results and Comparisons<br/>17.6 Conclusion<br/>Bibliography .
650 #0 - SUBJECT
Keyword Image processing
General subdivision Security measures.
650 #0 - SUBJECT
Keyword Data encryption (Computer science)
650 #0 - SUBJECT
Keyword Computer file sharing
General subdivision Security measures.
650 #0 - SUBJECT
Keyword Image files
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 15/06/2016 005.82 CIM/V P30814 15/06/2016 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha