Visual Cryptography and Its Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

BoBoCoAe, 2015. — 163 p. — ISBN: 8740301265, 9788740301267
In this book, one of data security methods known as visual cryptography (VC) is presented.
Specifically, visual cryptography allows effective and efficient secret sharing between a number of trusted parties. As with many cryptographic schemes, trust is the most difficult part. Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares.
Practical VC applications are also outlined. These applications involve the use of Moire patterns and watermarking techniques. Detailed analysis of the watermarking domain is presented along with various techniques and schemes that can incorporate VC successfully within the field of watermarking.
The foundations of these techniques are reviewed and examples provided.
Contents:
Traditional Visual Cryptography
Secret Sharing
Visual Cryptography
Size Invariant Visual Cryptography
Recursive Visual Cryptography
Analysis of Visual Cryptography
Mathematical Background
Analysis in the Frequency Domain
Extended Visual Cryptography
Extended Visual Cryptography
Halftone Visual Cryptography
Cheating Immune VC Schemes
Dot-Size Variant Visual Cryptography
Summary
Dynamic Visual Cryptography
Motivation
Basic Multiple Secret Sharing
Embedding a Share of Visual Cryptography in a Halftone Image
Colour Visual Cryptography
Colour Visual Cryptography
Image Sharing Using Random Masks
Quality Evaluation
Summary
Progressive Visual Cryptography
Motivation
Progressive Visual Cryptography
Summary
Image Hatching for Visual Cryptography
Introduction
Image Hatching with VC
Security Analysis
Summary
Applications for Visual Cryptography
Moire Patterns
Watermarking
Criteria for Evaluation Purposes
Summary

Author(s): Weir J., Yan WeiQi.

Language: English
Commentary: 1800111
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография