logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Visual Cryptography For Image Processing And Security Theory Methods And Applications 1st Edition Feng Liu

  • SKU: BELL-4932232
Visual Cryptography For Image Processing And Security Theory Methods And Applications 1st Edition Feng Liu
$ 31.00 $ 45.00 (-31%)

4.8

24 reviews

Visual Cryptography For Image Processing And Security Theory Methods And Applications 1st Edition Feng Liu instant download after payment.

Publisher: Springer International Publishing
File Extension: PDF
File size: 5.38 MB
Pages: 145
Author: Feng Liu, Wei Qi Yan (auth.)
ISBN: 9783319096438, 9783319096445, 3319096435, 3319096443
Language: English
Year: 2014
Edition: 1

Product desciption

Visual Cryptography For Image Processing And Security Theory Methods And Applications 1st Edition Feng Liu by Feng Liu, Wei Qi Yan (auth.) 9783319096438, 9783319096445, 3319096435, 3319096443 instant download after payment.

This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS. This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in document authentication and cryptography.

Related Products