Home
Perceptual Digital Imaging
Computational Photography
Single-Sensor Imaging
Color Image Processing
Super-Resolution Imaging
Cultural Heritage Imaging
Visual Cryptography
Graphs: Theory & Practice
Image Restoration

 

A new book on Visual Cryptography and Secret Image Sharing published!

Explore new techniques and applications of visual cryptography!

A volume in the Digital Imaging and Computer Vision series

Visual Cryptography and Secret Image Sharing

Edited by:
Stelvio Cimato* and Ching-Nung Yang**
*Universita degli studi di Milano, Italy
**National Dong Hwa University, Taiwan

Boca Raton, FL, CRC Press / Taylor & Francis, August 2011
ISBN 978-1-4398-3721-4

Audience:
bullet

Academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics

bullet

Industrial community (engineers, engineering managers, and research lab staff)

 

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data - such as medical records, financial transactions, and electronic voting systems - the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:
bullet

Potential for sharing multiple secrets

bullet

Visual cryptography scheme - based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images

bullet

Inclusion of pictures on the distributed shares

bullet

Contrast enhancement techniques

bullet

Color image visual cryptography

bullet

Cheating prevention

bullet

Alignment problems for image shares

bullet

Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

    Features:
bullet

Describes the latest techniques, algorithms, and solutions for image sharing and visual cryptography

bullet

Provides extensive coverage of both theoretical aspects and practical applications of image sharing techniques

bullet

Explores new techniques for visual cryptography using random grids and contrast optimizations

bullet

Details recent advances in visual cryptography, including probabilistic schemes and colored image sharing techniques

bullet

Includes several application examples of image sharing for steganography and authentication

Additional material is available at the companion web site www.colorimageprocessing.org.

Home | Perceptual Digital Imaging | Computational Photography | Single-Sensor Imaging | Color Image Processing | Super-Resolution Imaging | Cultural Heritage Imaging | Visual Cryptography | Graphs: Theory & Practice | Image Restoration

Last update: 07/12/12

2006 Rastislav Lukac