Muutke küpsiste eelistusi

E-raamat: Visual Cryptography and Secret Image Sharing

Edited by (National Dong Hwa University, Taiwan), Edited by (Universita degli studi di Milano, Italy)
  • Formaat - PDF+DRM
  • Hind: 100,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"Preface Secure digital imaging is an important research area combining methods and techniques coming from cryptography and image processing. Visual cryptography and in general secret image sharing techniques enable distributing sensitive visual materials to involved participants through public communication channels, as the generated secure images do not reveal any information if they are not combined in the prescribed way. In visual cryptography, the decoding process is performed directly by the human eyes, while in general, the shared images need some processing to reconstruct the secret image. The increasing number of possibilities to create, publish, and distribute images calls for novel protection methods, o ering new sharing and access control mechanisms for the information contained in the published images. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. Since both digital imaging and privacy protection are two research themes that involve a continuously growing number of people and applications, the book focuses on secure image sharing techniques, o ering an interesting reference point for studying and developing solutions needed in such areas. This book aims to ll the existing literature gap, providing a valid guide for professional people and/or researchers interested in such elds of research. It provides a scienti cally and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, and practitioners who are interested or involved in the study, research, use, design, and development of image sharing techniques"--

"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field"--

Provided by publisher.
List of Figures
xv
List of Tables
xxvii
Preface xxxi
Contributors xxxv
1 Visual Cryptography from Halftone Error Diffusion
1(30)
Gonzalo R. Arce
Zhongmin Wang
Giovanni Di Crescenzo
1.1 Introduction
2(3)
1.1.1 Visual Cryptography
2(1)
1.1.2 Halftone Visual Cryptography
3(1)
1.1.3 Blue Noise Error Diffusion
3(2)
1.2 Visual Secret Sharing
5(4)
1.2.1 Notion and Formal Definitions
5(3)
1.2.2 Construction of VSS Scheme
8(1)
1.3 Halftone VSS Construction Using Error Diffusion
9(7)
1.3.1 Share Structure
9(2)
1.3.2 Distribution of SIPs and ABPs
11(3)
1.3.3 Generation of Halftone Shares via Error Diffusion
14(2)
1.4 Halftone VSS Construction Using Parallel Error Diffusion
16(1)
1.5 Quality of Halftone Shares
17(2)
1.6 Discussion
19(1)
1.6.1 Improvement of Image Quality
19(1)
1.6.2 Comparison with Other Methods
19(1)
1.6.3 Image Decoding
19(1)
1.7 Simulation Results
20(6)
1.8 Conclusion
26(1)
Bibliography
27(4)
2 Visual Cryptography for Color Images
31(26)
Stelvio Cimato
Roberto De Prisco
Alfredo De Santis
2.1 Introduction
32(1)
2.2 Color Superposition
32(8)
2.2.1 Color Vision and Color Models
32(5)
2.2.2 Lattices
37(1)
2.2.3 The Darkening Problem
38(1)
2.2.4 The Annihilator Color
39(1)
2.2.5 The Identity Color
39(1)
2.3 Formal Models for Colored VCS
40(4)
2.3.1 The Models for B&W-VC
40(1)
2.3.2 The Models for Color-VC
40(3)
2.3.3 The SC, ND, and General Models
43(1)
2.3.4 Base Matrices
44(1)
2.4 Schemes for the SC Model
44(6)
2.4.1 The VV Schemes
45(2)
2.4.2 The BDD Schemes
47(1)
2.4.3 The KY and YL Schemes
47(1)
2.4.4 The CDD Schemes and a Lower Bound
48(2)
2.5 Schemes for the ND Model
50(2)
2.6 Schemes for the General Model
52(2)
2.6.1 (2, 2)-Threshold Schemes
52(2)
2.6.2 The (2, n)-Threshold AS Schemes
54(1)
2.7 Other Schemes
54(1)
2.8 Conclusions
55(1)
Bibliography
56(1)
3 Visual Cryptography for Multiple Secrets
57(38)
Shyong Jian Shyu
3.1 Introduction
57(2)
3.2 Naor and Shamir's Basic Visual Secret Sharing Scheme
59(3)
3.3 Visual Two-Secret Sharing Schemes
62(6)
3.3.1 Wu and Chen's Scheme
62(2)
3.3.2 Wu and Chang's Scheme
64(4)
3.4 Visual Multiple-Secret Sharing Schemes
68(23)
3.4.1 Shyu et al.'s Scheme
68(1)
3.4.1.1 Informal Description
68(1)
3.4.1.2 Encoding Circle Share A
69(2)
3.4.1.3 Encoding Circle Share B
71(9)
3.4.1.4 General Algorithm
80(3)
3.4.2 Feng et al.'s Scheme
83(2)
3.4.3 Experimental Results
85(2)
3.4.4 Comparison and Discussions
87(4)
3.5 Concluding Remarks
91(1)
Bibliography
92(3)
4 Extended Visual Cryptography for Photograph Images
95(32)
Yasushi Yamaguchi
4.1 Introduction
96(1)
4.2 Basic Visual Cryptography Schemes
96(7)
4.2.1 (k, n) Visual Secret Sharing Schemes
96(3)
4.2.2 Extended Visual Cryptography Scheme
99(2)
4.2.3 Random Grids
101(2)
4.3 Fundamentals of Photograph Visual Cryptography
103(6)
4.3.1 Digital Halftoning
103(3)
4.3.2 Image Quality and Related Parameters
106(1)
4.3.3 Photograph Visual Cryptography with Basic Schemes
107(2)
4.4 Variations of Photograph Visual Cryptography
109(7)
4.4.1 Approaches to Photograph Visual Cryptography
109(2)
4.4.2 Random-Dot Shadow Images
111(1)
4.4.3 Similar Shadow Images
111(1)
4.4.4 Positive and Negative Shadow Images
112(1)
4.4.5 Error and Secret Diffusion
113(1)
4.4.6 Simultaneous Iterative Search
114(1)
4.4.7 Tone Adjustment
114(1)
4.4.8 Continuous-Tone Subpixel
115(1)
4.5 Misalignment-Tolerant Photograph Visual Cryptography
116(4)
4.5.1 Theory and Implementation
116(4)
4.5.2 Results
120(1)
4.6 Conclusions
120(3)
Bibliography
123(4)
5 Probabilistic Visual Cryptography Schemes
127(28)
Stelvio Cimato
Roberto De Prisco
Alfredo De Santis
5.1 Introduction
127(2)
5.2 Visual Cryptography Schemes
129(4)
5.2.1 The Deterministic Model
129(2)
5.2.2 The Probabilistic Model
131(2)
5.3 Canonical Probabilistic Schemes
133(2)
5.4 Probabilistic Schemes with No Pixel Expansion
135(3)
5.5 Trading Pixel Expansion with Probabilities
138(4)
5.5.1 Probabilistic Schemes with Given Pixel Expansion
138(4)
5.6 Constructing Probabilistic Schemes
142(5)
5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
142(2)
5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
144(3)
5.7 Probabilistic Schemes with Boolean Operations
147(3)
5.7.1 (2,n) Scheme for Binary Images (Wang)
147(2)
5.7.2 (n,n) Scheme for Binary Images (Wang)
149(1)
5.8 Conclusions and Open Problems
150(1)
Bibliography
151(4)
6 XOR-Based Visual Cryptography
155(30)
Daoshun Wang
Lin Dong
6.1 Introduction
155(1)
6.2 Preliminaries
156(2)
6.3 Visual Cryptography Scheme Using the Polarization of Light
158(10)
6.3.1 (2, n) Scheme
158(1)
6.3.2 (n, n) Scheme
159(1)
6.3.3 (k, n) Scheme
159(9)
6.4 Visual Cryptography Scheme with Reversing
168(6)
6.4.1 (k, n) VC Scheme Using Cyclic-Shift Operation
168(3)
6.4.2 A Scheme for General Access Structure
171(3)
6.5 Secret Sharing Scheme Using Boolean Operation
174(7)
6.5.1 (2, n) Scheme
175(1)
6.5.2 (n, n) Scheme
176(2)
6.5.3 (k, n) Scheme
178(3)
6.6 Conclusion
181(1)
Bibliography
181(4)
7 Visual Cryptography and Random Grids
185(38)
Shyong Jian Shyu
7.1 Introduction
185(1)
7.2 Random Grids
186(3)
7.2.1 Random Pixel, Random Grid, and Average Light Transmission
186(1)
7.2.2 Superimposition of Random Grids
187(2)
7.3 Visual Cryptograms of Random Grids
189(30)
7.3.1 Definition of VCRG
189(1)
7.3.2 (2, 2)-VCRG Algorithms for Binary Images
190(3)
7.3.3 Experiments for (2, 2)-VCRG
193(1)
7.3.4 Definition of Light Contrast and Performance Evaluation
194(2)
7.3.5 Algorithms of (n, n)-VCRG for Binary Images
196(10)
7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color Images
206(1)
7.3.7 Experiments for (n, n)-VCRG
207(12)
7.4 Concluding Remarks
219(1)
Bibliography
220(3)
8 Visual Cryptography and Contrast Bounds
223(32)
Andreas Klein
8.1 Introduction
223(2)
8.2 Preliminaries
225(2)
8.3 Approximate Inclusion Exclusion
227(5)
8.4 Designs and Codes
232(4)
8.5 Optimal 3-out-of-n Schemes
236(5)
8.6 Asymptotic Optimal k-out-of-n Schemes
241(3)
8.7 Contrast Trade-Offs for Extended Visual Cryptography Schemes
244(7)
8.8 Enhancing the Contrast by Nonstandard Models
251(1)
8.9 Conclusion
251(1)
Bibliography
252(3)
9 Visual Cryptography Schemes with Reversing
255(26)
Alfredo De Santis
Anna Lisa Ferrara
Barbara Masucci
9.1 Introduction
255(3)
9.2 Visual Cryptography Schemes
258(4)
9.2.1 (k, k)-Threshold Visual Cryptography Schemes
259(1)
9.2.2 Perfect Black Visual Cryptography Schemes
260(2)
9.3 Almost Ideal Contrast VCS with Reversing
262(3)
9.4 Ideal Contrast VCS with Reversing
265(13)
9.4.1 A Construction Using a Binary Secret Sharing Scheme
266(2)
9.4.2 Constructions Using Perfect Black VCSs
268(1)
9.4.2.1 The Scheme by Cimato, De Santis, Ferrara, and Masucci
269(2)
9.4.2.2 The Scheme by Hu and Tzeng
271(3)
9.4.2.3 The Scheme by Yang, Wang, and Chen
274(2)
9.4.2.4 Comparisons
276(1)
9.4.3 A Construction Using a Nonperfect Black VCS
276(2)
9.5 Conclusions
278(1)
Bibliography
278(3)
10 Cheating Prevention in Visual Cryptography
281(16)
Yu-Chi Chen
Gwoboa Horng
Du-Shiau Tsai
10.1 Introduction
281(1)
10.2 Preliminaries
282(5)
10.2.1 Visual Cryptography
282(3)
10.2.2 Cheating in VC
285(2)
10.3 Cheating Prevention Schemes
287(7)
10.3.1 HCT1 and HCT2
287(2)
10.3.2 HT
289(1)
10.3.3 TCH
290(2)
10.3.4 PS1 and PS2
292(2)
10.4 Analysis of Cheating Prevention Schemes
294(1)
10.5 Conclusions
295(1)
Bibliography
295(2)
11 Resolving the Alignment Problem in Visual Cryptography
297(32)
Feng Liu
11.1 Introduction
297(2)
11.2 Preliminaries
299(3)
11.3 Misalignment with Integer Number of Subpixels
302(7)
11.4 Misalignment with Less Than One Subpixel
309(10)
11.4.1 Shares with Slightly Misalignment Can Still Recover the Secret Image
310(6)
11.4.2 Large Subpixels Have Better Misalignment Tolerance
316(3)
11.5 A Misalignment Tolerant VCS
319(6)
11.5.1 The Algorithm
319(3)
11.5.2 Simulations
322(3)
11.6 Conclusions and Discussions
325(1)
11.7 Acknowledgments
325(1)
Bibliography
325(4)
12 Applications of Visual Cryptography
329(22)
Bernd Borchert
Klaus Reinhardt
12.1 Introduction
329(4)
12.2 Trojan-Secure Confirmation of Transactions
333(1)
12.3 Trojan-Secure Authentication Using a PIN
334(5)
12.4 Security versus Multiple Use
339(4)
12.5 Using Refraction
343(3)
12.6 Technical Problems Concerning Adjustment and Parallaxes
346(1)
12.7 Voting with a Receipt Based on visual cryptography
347(2)
12.8 Conclusion
349(1)
Bibliography
349(2)
13 Steganography in Halftone Images
351(30)
Oscar C. Au
Yuanfang Guo
John S. Ho
13.1 Introduction
351(1)
13.2 A Review of Error Diffusion
352(4)
13.3 Data Hiding by Stochastic Error Diffusion (DHSED)
356(3)
13.4 Data Hiding by Conjugate Error Diffusion (DHCED)
359(4)
13.5 Performance Analysis
363(14)
13.6 Summary
377(2)
Bibliography
379(2)
14 Image Secret Sharing
381(22)
Wei Qi Yan
Jonathan Weir
Mohan S. Kankanhalli
14.1 Introduction
381(3)
14.2 State of the Art
384(5)
14.3 Approaches for Image Sharing
389(8)
14.3.1 Shamir's Secret Sharing Scheme
389(1)
14.3.2 Color Image Sharing Based on the Lagrange Interpolation
389(3)
14.3.3 Color Image Sharing Based on Moving Lines
392(4)
14.3.4 Improved Algorithm
396(1)
14.4 Experiment and Evaluation
397(2)
14.5 Conclusion
399(1)
Bibliography
400(3)
15 Polynomial-Based Image Sharing
403(22)
Shiuh-Jeng Wang
Chen-Hsing Yang
Yu-Ting Chen
15.1 Introduction
404(1)
15.2 Polynomial-Based Sharing Scheme
405(2)
15.2.1 Shamir's Secret Sharing Scheme
405(1)
15.2.2 Lagrange Interpolation Scheme
406(1)
15.3 Preliminaries and Related Works
407(5)
15.3.1 Thien-Lin Scheme
407(1)
15.3.2 Lin-Tsai Scheme
407(2)
15.3.3 Yang et al.'s Scheme
409(1)
15.3.4 Inverted Pattern LSB Scheme
409(1)
15.3.5 Scalable Secret Image Sharing
410(2)
15.4 Wang et al.'s Scheme
412(6)
15.4.1 Secret Image Sharing
412(2)
15.4.2 Set-Up Authentication
414(2)
15.4.3 Main Algorithms
416(2)
15.5 Experimental Results
418(5)
15.5.1 Fidelity Analysis
418(1)
15.5.2 Evaluating Authentication
419(4)
15.6 Conclusions
423(1)
Bibliography
423(2)
16 Image Sharing with Steganography and Authentication
425(38)
Zhao-Xia Yin
Chia-Chen Lin
Chin-Chen Chang
16.1 Introduction
425(3)
16.2 Related Work
428(6)
16.2.1 Lin and Tsai's Scheme
428(2)
16.2.2 Yang et al.'s Scheme
430(2)
16.2.3 Chang et al.'s Scheme
432(2)
16.3 Adopted Techniques in the Proposed Scheme
434(11)
16.3.1 Error Diffusion Technique
434(5)
16.3.2 Interpolation Technique
439(1)
16.3.3 Canny Edge Detector
440(1)
16.3.4 Edge Lookup Inverse Halftoning Technique
441(2)
16.3.5 Shamir Scheme for Secret Sharing
443(2)
16.4 Proposed Scheme
445(8)
16.4.1 Sharing and Embedding Phase
445(4)
16.4.2 Reconstruction and Verifying Phase
449(4)
16.5 Experimental Results
453(5)
16.6 Conclusions
458(1)
Bibliography
459(4)
17 Two-Decoding-Option Image Sharing Method
463(24)
Ching-Nung Yang
Chuei-Bang Ciou
Tse-Shih Chen
17.1 Introduction
463(2)
17.2 Preliminaries
465(3)
17.2.1 PISSS
465(1)
17.2.2 VCS
466(2)
17.3 Previous Works
468(2)
17.3.1 Jin et al.'s TiOISSS
468(1)
17.3.2 Lin and Lin's TiOISSS
468(2)
17.4 A New (k, n)-TiOISSS
470(8)
17.4.1 Design Concept
471(2)
17.4.2 The Lossless TiOISSS
473(5)
17.5 Experimental Results and Comparisons
478(3)
17.6 Conclusion
481(3)
Bibliography
484(3)
Index 487
Stelvio Cimato, Ching-Nung Yang