skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Improving image quality in visual cryptography Preview this item
ClosePreview this item
Checking...

Improving image quality in visual cryptography

Author: Bin Yan; Yong Xiang; Guang Hua
Publisher: Singapore : Springer, [2020] ©2020
Series: Signals and communication technology.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bin Yan; Yong Xiang; Guang Hua
ISBN: 9789811382895 9811382891
OCLC Number: 1104209196
Description: 1 online resource.
Contents: Introduction --
Basic visual cryptography algorithms --
Improving the visual quality for binary secret images --
Digital Halftoning --
Improving visual quality for share images --
Improving visual quality for probabilistic and random grid schemes --
Improving visual quality for vector schemes --
Conclusion.
Series Title: Signals and communication technology.
Responsibility: Ben Yan, Yong Xiang and Guang Hua.

Abstract:

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1104209196<\/a>> # Improving image quality in visual cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1104209196<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/si<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/technology_&_engineering_operations_research<\/a>> ; # TECHNOLOGY & ENGINEERING \/ Operations Research<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/coding_theory<\/a>> ; # Coding theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/science_system_theory<\/a>> ; # SCIENCE \/ System Theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/hua_guang<\/a>> ; # Guang Hua<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/yan_bin<\/a>> ; # Bin Yan<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/xiang_yong<\/a>> ; # Yong Xiang<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Introduction -- Basic visual cryptography algorithms -- Improving the visual quality for binary secret images -- Digital Halftoning -- Improving visual quality for share images -- Improving visual quality for probabilistic and random grid schemes -- Improving visual quality for vector schemes -- Conclusion.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/9049599641<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Series\/signals_and_communication_technology<\/a>> ; # Signals and communication technology.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Improving image quality in visual cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1104209196<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-981-13-8289-5<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2156661<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ezproxy.lau.edu.lb:2443\/login?url=https:\/\/doi.org\/10.1007\/978-981-13-8289-5<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-981-13-8<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9789811382895<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB9B1732<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1104209196<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1007\/978-981-13-8<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/hua_guang<\/a>> # Guang Hua<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Hua<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Guang<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Guang Hua<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/xiang_yong<\/a>> # Yong Xiang<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Xiang<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Yong<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Yong Xiang<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Person\/yan_bin<\/a>> # Bin Yan<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Yan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Bin<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Bin Yan<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Series\/signals_and_communication_technology<\/a>> # Signals and communication technology.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1104209196<\/a>> ; # Improving image quality in visual cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Signals and communication technology.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Signals and communication technology<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/coding_theory<\/a>> # Coding theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Coding theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/science_system_theory<\/a>> # SCIENCE \/ System Theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"SCIENCE \/ System Theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9049599641#Topic\/technology_&_engineering_operations_research<\/a>> # TECHNOLOGY & ENGINEERING \/ Operations Research<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TECHNOLOGY & ENGINEERING \/ Operations Research<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/si<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"si<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9789811382895<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9811382891<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9789811382895<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n