0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Visual Cryptography and Secret Image Sharing (Paperback): Stelvio Cimato, Ching-Nung Yang Visual Cryptography and Secret Image Sharing (Paperback)
Stelvio Cimato, Ching-Nung Yang
R2,672 Discovery Miles 26 720 Ships in 12 - 17 working days

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Visual Cryptography and Secret Image Sharing (Hardcover): Stelvio Cimato, Ching-Nung Yang Visual Cryptography and Secret Image Sharing (Hardcover)
Stelvio Cimato, Ching-Nung Yang
R6,451 Discovery Miles 64 510 Ships in 12 - 17 working days

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

  • Potential for sharing multiple secrets
  • Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Security with Intelligent Computing and Big-data Services - Proceedings of the Second International Conference on Security with... Security with Intelligent Computing and Big-data Services - Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) (Paperback, 1st ed. 2020)
Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
R6,068 Discovery Miles 60 680 Ships in 10 - 15 working days

This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.

Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised... Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Ching-Nung Yang
R3,476 Discovery Miles 34 760 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R5,134 Discovery Miles 51 340 Ships in 12 - 17 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cancer, Stress & Mindset - Focusing the…
Brandon Lagreca Hardcover R662 R598 Discovery Miles 5 980
Fabulously 40 And Beyond - Women Coming…
Margie Orford, Karin Schimke Paperback R250 R125 Discovery Miles 1 250
Adventures of Michailow - a Russian…
Vasilii Mikhailov Paperback R451 Discovery Miles 4 510
The Lion's Historian - Africa's Animal…
Sandra Swart Paperback R320 R295 Discovery Miles 2 950
Hiking Trails Of South Africa
Willie Olivier Paperback R380 R351 Discovery Miles 3 510
Disciple - Walking With God
Rorisang Thandekiso, Nkhensani Manabe Paperback R280 R263 Discovery Miles 2 630
How Language Speaks to Music - Prosody…
Mathias Scharinger, Richard Wiese Hardcover R3,307 Discovery Miles 33 070
Felbar's Shoppe of Curiosities and…
Cory Jeffrey Burns Hardcover R1,933 Discovery Miles 19 330
Surviving in the Field of International…
Jose Maria de la Jara, Carolina Arroyo, … Hardcover R5,839 Discovery Miles 58 390
Now You Know How Mapetla Died - The…
Zikhona Valela Paperback R350 R328 Discovery Miles 3 280

 

Partners