Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications

By: Liu, FengContributor(s): Yan, Wei QiMaterial type: TextTextSeries: eBooks on DemandPublisher: Dordrecht : Springer, 2014Description: 1 online resource (154 p.)ISBN: 9783319096445Subject(s): Computer science | Computers -- Access control | Data encryption (Computer science) | Image processing -- Digital techniquesGenre/Form: Electronic books.Additional physical formats: Print version:: Visual Cryptography for Image Processing and Security : Theory, Methods, and ApplicationsDDC classification: 005.82 LOC classification: QA76.9 .A25Online resources: Click here to view this ebook.
Contents:
Preface; Acknowledgments; Contents; About the Authors; Acronyms; 1 Fundamental Theory of Visual Cryptography; 1.1 Introduction; 1.2 Access Structure; 1.3 Fundamental (k, n)-VCS; 1.4 Equivalence of VCS Definitions; 1.4.1 The Equivalence of Two Definitions of Threshold Basis Matrix VCS; 1.4.2 The Equivalence of Two Definitions of General Access Structure Basis Matrix VCS; 1.4.3 The Equivalence of Two Definitions of General Access Structure SIVCS; 1.4.4 The Inequivalence of Two Definitions of Non-basis Matrix VCS; 1.5 Step Construction of VCS
1.5.1 Definition of Step Construction and Step Construction of (n, n)-VCS1.5.2 Simplifying the Access Structure Using Equivalent Participants; 1.5.3 Step Construction of VCS for Access Structure Γm = {A1,A2,, Ar} such that A1A2Ar = {a1, a2,, ar}neq; 1.5.4 Step Construction of VCS for General Access Structure; References; 2 Various Problems in Visual Cryptography; 2.1 Alignment Problems; 2.1.1 Precise Alignment of VCS; 2.1.2 Visual Alignment of VCS; 2.2 VCS Cheating Prevention; 2.2.1 Definitions; 2.2.2 Attacks; 2.3 Flipping Issues in VCS; 2.3.1 Share Generating; 2.3.2 Share Expansion
2.4 Distortion Problems2.4.1 The Fountain Algorithm; 2.4.2 Improving VC Quality; 2.5 Thin Line Problems (TLP); References; 3 Various Visual Cryptography Schemes; 3.1 Embedded Extended VCS; 3.1.1 Introduction; 3.1.2 Embedded EVCS; 3.1.3 Generating the Covering Shares for an Access Structure Using the Dithering Matrices; 3.1.4 Embedding the Shares of the Corresponding VCS into the Covering Shares; 3.1.5 Further Improvements on the Visual Quality of Shares; 3.2 Probabilistic Visual Cryptography Scheme; 3.3 Size Invariant VCS (SIVCS); 3.4 A ME-SIVCS that Satisfies ME-SIVCS-2 Security
3.5 A ME-SIVCS that Satisfies ME-SIVCS-1 Security3.6 Threshold VCS (TVCS); 3.7 Construction of (k, n)-TVCS; 3.8 Concolorous TVCS; 3.8.1 The Model of Concolorous TVCS; 3.8.2 The Existence and Construction of Concolorous TVCS; 3.9 Construction of (k, n)-TEVCS; 3.9.1 The Model; 3.9.2 Constructions of (k, n)-TEVCS; 3.10 A Security Enriched VCS; 3.10.1 PSSS; 3.10.2 ESSVCS; References; 4 Various Color Schemes of Visual Cryptography; 4.1 Introduction; 4.2 Basic Principles of Color Models; 4.3 Color VCS and Color EVCS Under the Traditional Visual Cryptography Model; References
5 Various Applications of Visual Cryptography5.1 Watermarking Applications; 5.1.1 Watermarking; 5.1.2 Visual Cryptography; 5.2 Resolution Variant Visual Cryptography; 5.2.1 License Plate Embedding; 5.2.2 Multi-resolution VC Scheme; References; Index
Summary: This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptograph
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9 .A25 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1802698 Available EBL1802698

Preface; Acknowledgments; Contents; About the Authors; Acronyms; 1 Fundamental Theory of Visual Cryptography; 1.1 Introduction; 1.2 Access Structure; 1.3 Fundamental (k, n)-VCS; 1.4 Equivalence of VCS Definitions; 1.4.1 The Equivalence of Two Definitions of Threshold Basis Matrix VCS; 1.4.2 The Equivalence of Two Definitions of General Access Structure Basis Matrix VCS; 1.4.3 The Equivalence of Two Definitions of General Access Structure SIVCS; 1.4.4 The Inequivalence of Two Definitions of Non-basis Matrix VCS; 1.5 Step Construction of VCS

1.5.1 Definition of Step Construction and Step Construction of (n, n)-VCS1.5.2 Simplifying the Access Structure Using Equivalent Participants; 1.5.3 Step Construction of VCS for Access Structure Γm = {A1,A2,, Ar} such that A1A2Ar = {a1, a2,, ar}neq; 1.5.4 Step Construction of VCS for General Access Structure; References; 2 Various Problems in Visual Cryptography; 2.1 Alignment Problems; 2.1.1 Precise Alignment of VCS; 2.1.2 Visual Alignment of VCS; 2.2 VCS Cheating Prevention; 2.2.1 Definitions; 2.2.2 Attacks; 2.3 Flipping Issues in VCS; 2.3.1 Share Generating; 2.3.2 Share Expansion

2.4 Distortion Problems2.4.1 The Fountain Algorithm; 2.4.2 Improving VC Quality; 2.5 Thin Line Problems (TLP); References; 3 Various Visual Cryptography Schemes; 3.1 Embedded Extended VCS; 3.1.1 Introduction; 3.1.2 Embedded EVCS; 3.1.3 Generating the Covering Shares for an Access Structure Using the Dithering Matrices; 3.1.4 Embedding the Shares of the Corresponding VCS into the Covering Shares; 3.1.5 Further Improvements on the Visual Quality of Shares; 3.2 Probabilistic Visual Cryptography Scheme; 3.3 Size Invariant VCS (SIVCS); 3.4 A ME-SIVCS that Satisfies ME-SIVCS-2 Security

3.5 A ME-SIVCS that Satisfies ME-SIVCS-1 Security3.6 Threshold VCS (TVCS); 3.7 Construction of (k, n)-TVCS; 3.8 Concolorous TVCS; 3.8.1 The Model of Concolorous TVCS; 3.8.2 The Existence and Construction of Concolorous TVCS; 3.9 Construction of (k, n)-TEVCS; 3.9.1 The Model; 3.9.2 Constructions of (k, n)-TEVCS; 3.10 A Security Enriched VCS; 3.10.1 PSSS; 3.10.2 ESSVCS; References; 4 Various Color Schemes of Visual Cryptography; 4.1 Introduction; 4.2 Basic Principles of Color Models; 4.3 Color VCS and Color EVCS Under the Traditional Visual Cryptography Model; References

5 Various Applications of Visual Cryptography5.1 Watermarking Applications; 5.1.1 Watermarking; 5.1.2 Visual Cryptography; 5.2 Resolution Variant Visual Cryptography; 5.2.1 License Plate Embedding; 5.2.2 Multi-resolution VC Scheme; References; Index

This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptograph

Description based upon print version of record.

There are no comments on this title.

to post a comment.