Visual cryptography and secret image sharing
"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is...
Main Authors: | Ching-Nung, Yang (Author), Cimato, Stelvio (Author) |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, Florida :
CRC Press ,
c2012
|
Series: | Digital imaging and computer vision
|
Subjects: |
Similar Items
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Cryptography and network security : principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Hacking exposed web application : web applicationsecurity secrets and solutions
by: Scambray, Joel, et al.
Published: (2011)
by: Scambray, Joel, et al.
Published: (2011)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by: Macaulay, Tyson, et al.
Published: (2012)
by: Macaulay, Tyson, et al.
Published: (2012)
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Security strategy : from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Industrial network security : securing critical infrastructure networks for smart grid, scada, and other industrial control systems
by: Knapp, Eric D., et al.
Published: (2015)
by: Knapp, Eric D., et al.
Published: (2015)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Digital privacy : theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Hacking exposed 7 : network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Hacking exposed : network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Multimedia content encryption : techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
How to attack and defend your website
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Information security for managers
by: Workman, Michael D. 1957-, et al.
Published: (2013)
by: Workman, Michael D. 1957-, et al.
Published: (2013)
Applied cryptography : protocols, algorithms, and source code in C
by: Schneier, Bruce , 1963-
Published: (2015)
by: Schneier, Bruce , 1963-
Published: (2015)
Securing the clicks [ network security in the age of social media
by: Bahadur, Gary, et al.
Published: (2012)
by: Bahadur, Gary, et al.
Published: (2012)
A practical approach for image classification
by: Mokhairi Makhtar
Published: (2016)
by: Mokhairi Makhtar
Published: (2016)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Optimizing ieee 802.11i resource and security essentials : for mobile and stationary devices
by: Naraei, Parisa, et al.
Published: (2015)
by: Naraei, Parisa, et al.
Published: (2015)
Important concepts in image processing [
by: Collett, Gregory
Published: (2014)
by: Collett, Gregory
Published: (2014)
UNIX system security : how to protect your date and prevent intruders
by: Farrow, Rik , 1950-
Published: (1991)
by: Farrow, Rik , 1950-
Published: (1991)
Cryptographic protocol : security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012)
by: Ling, Dong, et al.
Published: (2012)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Principles of information systems security : text and cases
by: Dhillon, Gurpreet , 1963-
Published: (2007)
by: Dhillon, Gurpreet , 1963-
Published: (2007)
Network security essentials : applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
How to cheat at securing your network
by: Dubrawsky, Ido
Published: (2007)
by: Dubrawsky, Ido
Published: (2007)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael , 1965-, et al.
Published: (2010)
by: Howard, Michael , 1965-, et al.
Published: (2010)
Principles of information security
by: Whitman, Michael E. , 1964-, et al.
Published: (2009)
by: Whitman, Michael E. , 1964-, et al.
Published: (2009)
Similar Items
-
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011) -
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011) -
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2006) -
Cryptography and network security : principles and practice
by: Stalling, William
Published: (2006) -
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2017)