Book description
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.
Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.
An exploration of the most prominent topics in digital imaging security, this book discusses:
- Potential for sharing multiple secrets
- Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
- Inclusion of pictures in the distributed shares
- Contrast enhancement techniques
- Color-image visual cryptography
- Cheating prevention
- Alignment problems for image shares
- Steganography and authentication
In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Contributors
- 1 Visual Cryptography from Halftone Error Diffusion
- 2 Visual Cryptography for Color Images
- 3 Visual Cryptography for Multiple Secrets
- 4 Extended Visual Cryptography for Photograph Images
-
5 Probabilistic Visual Cryptography Schemes
- 5.1 Introduction
- 5.2 Visual Cryptography Schemes
- 5.3 Canonical Probabilistic Schemes
- 5.4 Probabilistic Schemes with No Pixel Expansion
- 5.5 Trading Pixel Expansion with Probabilities
- 5.6 Constructing Probabilistic Schemes
- 5.7 Probabilistic Schemes with Boolean Operations
- 5.8 Conclusions and Open Problems
- Bibliography
- 6 XOR-Based Visual Cryptography
-
7 Visual Cryptography and Random Grids
- 7.1 Introduction
- 7.2 Random Grids
-
7.3 Visual Cryptograms of Random Grids
- 7.3.1 Definition of VCRG
- 7.3.2 (2, 2)-VCRG Algorithms for Binary Images
- 7.3.3 Experiments for (2, 2)-VCRG
- 7.3.4 Definition of Light Contrast and Performance Evaluation
- 7.3.5 Algorithms of (n, n)-VCRG for Binary Images
- 7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color Images
- 7.3.7 Experiments for (n, n)-VCRG
- 7.4 Concluding Remarks
- Bibliography
- 8 Visual Cryptography and Contrast Bounds
-
9 Visual Cryptography Schemes with Reversing
- 9.1 Introduction
- 9.2 Visual Cryptography Schemes
- 9.3 Almost Ideal Contrast VCS with Reversing
-
9.4 Ideal Contrast VCS with Reversing
- 9.4.1 A Construction Using a Binary Secret Sharing Scheme
- 9.4.2 Constructions Using Perfect Black VCSs
- 9.4.2.1 The Scheme by Cimato, De Santis, Ferrara, and Masucci
- 9.4.2.2 The Scheme by Hu and Tzeng
- 9.4.2.3 The Scheme by Yang, Wang, and Chen
- 9.4.2.4 Comparisons
- 9.4.3 A Construction Using a Nonperfect Black VCS
- 9.5 Conclusions
- Bibliography
- 10 Cheating Prevention in Visual Cryptography
- 11 Resolving the Alignment Problem in Visual Cryptography
-
12 Applications of Visual Cryptography
- 12.1 Introduction
- 12.2 Trojan-Secure Confirmation of Transactions
- 12.3 Trojan-Secure Authentication Using a PIN
- 12.4 Security versus Multiple Use
- 12.5 Using Refraction
- 12.6 Technical Problems Concerning Adjustment and Parallaxes
- 12.7 Voting with a Receipt Based on visual cryptography
- 12.8 Conclusion
- Bibliography
- 13 Steganography in Halftone Images
- 14 Image Secret Sharing
- 15 Polynomial-Based Image Sharing
- 16 Image Sharing with Steganography and Authentication
- 17 Two-Decoding-Option Image Sharing Method
- Index
Product information
- Title: Visual Cryptography and Secret Image Sharing
- Author(s):
- Release date: December 2017
- Publisher(s): CRC Press
- ISBN: 9781351833547
You might also like
book
Disappearing Cryptography, 3rd Edition
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …
book
Crypto Dictionary
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. …
book
Beginning F# 4.0
This book is a great foundation for exploring functional-first programming and its role in the future …
book
F# Deep Dives
F# Deep Dives presents a collection of real-world F# techniques, each written by expert practitioners. Each …