Get Free Shipping on orders over $79
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications - Feng Liu

Visual Cryptography for Image Processing and Security

Theory, Methods, and Applications

By: Feng Liu, Wei Qi Yan

eText | 20 August 2014

At a Glance

eText


$129.00

or 4 interest-free payments of $32.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS. This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in document authentication and cryptography.

on
Desktop
Tablet
Mobile

Other Editions and Formats

PDF

Published: 1st October 2015

Instant online reading in your Booktopia eTextbook Library *

More in Data Encryption