Using colors to improve visual cryptography for black and white images
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Improving the visual quality of size invariant visual cryptography scheme
Journal of Visual Communication and Image Representation
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
Flexible visual cryptography scheme without distortion
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Enhancing the perceived visual quality of a size invariant visual cryptography scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Essential secret image sharing scheme with different importance of shadows
Journal of Visual Communication and Image Representation
Visual cryptography based watermarking: definition and meaning
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Region-in-Region incrementing visual cryptography scheme
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A secret enriched visual cryptography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Color visual cryptography schemes for black and white secret images
Theoretical Computer Science
Aspect ratio invariant visual cryptography by image filtering and resizing
Personal and Ubiquitous Computing
Image encryption based on the finite field cosine transform
Image Communication
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemesbased either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.