0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Visual Cryptography and Secret Image Sharing (Paperback): Stelvio Cimato, Ching-Nung Yang Visual Cryptography and Secret Image Sharing (Paperback)
Stelvio Cimato, Ching-Nung Yang
R2,621 Discovery Miles 26 210 Ships in 12 - 19 working days

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Visual Cryptography and Secret Image Sharing (Hardcover): Stelvio Cimato, Ching-Nung Yang Visual Cryptography and Secret Image Sharing (Hardcover)
Stelvio Cimato, Ching-Nung Yang
R6,326 Discovery Miles 63 260 Ships in 12 - 19 working days

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

  • Potential for sharing multiple secrets
  • Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Security with Intelligent Computing and Big-data Services - Proceedings of the Second International Conference on Security with... Security with Intelligent Computing and Big-data Services - Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) (Paperback, 1st ed. 2020)
Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
R5,768 Discovery Miles 57 680 Ships in 10 - 15 working days

This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.

Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised... Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Ching-Nung Yang
R3,307 Discovery Miles 33 070 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R5,035 Discovery Miles 50 350 Ships in 12 - 19 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Reversing Hemodialysis - Success Stories…
Health Central Paperback R499 Discovery Miles 4 990
Remote Control - Television in Prison
V Knight Hardcover R2,924 R1,961 Discovery Miles 19 610
The Bank Directors Handbook - The Board…
Gup Hardcover R887 Discovery Miles 8 870
Crime and the Construction of Forensic…
Alison Adam Hardcover R4,584 Discovery Miles 45 840
The Bank of the United States and the…
Edward Kaplan Hardcover R2,218 Discovery Miles 22 180
Hot Water
Nadine Dirks Paperback R280 R259 Discovery Miles 2 590
Reversing Giant Cell Arteritis - Healing…
Health Central Paperback R499 Discovery Miles 4 990
The Euro - Evolution and Prospects
Philip Arestis, Andrew Brown, … Hardcover R3,022 Discovery Miles 30 220
Policymaking in the European Central…
Karl Kaltenthaler Hardcover R3,063 Discovery Miles 30 630
Reversing Wart - Healing Herbs The Raw…
Health Central Paperback R499 Discovery Miles 4 990

 

Partners