000 -LEADER |
fixed length control field |
05094cam a2200409 a 4500 |
001 - CONTROL NUMBER |
control field |
16930924 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230405154506.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110822s2012 flua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011029864 |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015790260 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781439837214 (hardback) |
|
International Standard Book Number |
143983721X (hardback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn475450986 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
BTCTA |
-- |
YDXCP |
-- |
BWX |
-- |
UKMGB |
-- |
CDX |
-- |
DLC |
Language of cataloging |
ENGLISH |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TA1637 |
Item number |
.V544 2012 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
CIM-V |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM083000 |
-- |
MAT003000 |
-- |
TEC015000 |
Number source |
bisacsh |
245 00 - TITLE STATEMENT |
Title |
Visual cryptography and secret image sharing / |
Statement of responsibility, etc. |
edited by Stelvio Cimato, Ching-Nung Yang. |
250 ## - EDITION STATEMENT |
Edition statement |
Library Edition: Cryptography |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxvi, 501 p. : |
Other physical details |
ill. (some col.) ; |
Dimensions |
24 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"--Provided by publisher. |
|
Summary, etc. |
"Preface Secure digital imaging is an important research area combining methods and techniques coming from cryptography and image processing. Visual cryptography and in general secret image sharing techniques enable distributing sensitive visual materials to involved participants through public communication channels, as the generated secure images do not reveal any information if they are not combined in the prescribed way. In visual cryptography, the decoding process is performed directly by the human eyes, while in general, the shared images need some processing to reconstruct the secret image. The increasing number of possibilities to create, publish, and distribute images calls for novel protection methods, o ering new sharing and access control mechanisms for the information contained in the published images. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. Since both digital imaging and privacy protection are two research themes that involve a continuously growing number of people and applications, the book focuses on secure image sharing techniques, o ering an interesting reference point for studying and developing solutions needed in such areas. This book aims to ll the existing literature gap, providing a valid guide for professional people and/or researchers interested in such elds of research. It provides a scienti cally and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, and practitioners who are interested or involved in the study, research, use, design, and development of image sharing techniques"--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Image processing |
General subdivision |
Security measures. |
9 (RLIN) |
32166 |
|
Topical term or geographic name as entry element |
Data encryption (Computer science) |
9 (RLIN) |
466 |
|
Topical term or geographic name as entry element |
Computer file sharing |
General subdivision |
Security measures. |
9 (RLIN) |
32169 |
|
Topical term or geographic name as entry element |
Image files |
General subdivision |
Security measures. |
9 (RLIN) |
32170 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Cimato, Stelvio. |
9 (RLIN) |
32171 |
|
Personal name |
Yang, Ching-Nung. |
9 (RLIN) |
32172 |
490 0# - SERIES STATEMENT |
Series statement |
Digital imaging and computer vision |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Reference |
Edition |
Library Edition: Cryptography |