000 04171nam a22006015i 4500
001 978-981-13-8289-5
003 DE-He213
005 20220801215038.0
007 cr nn 008mamaa
008 190608s2020 si | s |||| 0|eng d
020 _a9789811382895
_9978-981-13-8289-5
024 7 _a10.1007/978-981-13-8289-5
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aYan, Bin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_942007
245 1 0 _aImproving Image Quality in Visual Cryptography
_h[electronic resource] /
_cby Bin Yan, Yong Xiang, Guang Hua.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXVIII, 120 p. 74 illus., 13 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSignals and Communication Technology,
_x1860-4870
505 0 _aIntroduction -- Basic visual cryptography algorithms -- Improving the visual quality for binary secret images -- Digital Halftoning -- Improving visual quality for share images -- Improving visual quality for probabilistic and random grid schemes -- Improving visual quality for vector schemes -- Conclusion.
520 _aThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.
650 0 _aSignal processing.
_94052
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aInformation visualization.
_914255
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aCryptology.
_931769
650 2 4 _aData and Information Visualization.
_933848
700 1 _aXiang, Yong.
_eauthor.
_0(orcid)0000-0001-5252-0831
_1https://orcid.org/0000-0001-5252-0831
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_942008
700 1 _aHua, Guang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_942009
710 2 _aSpringerLink (Online service)
_942010
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811382888
776 0 8 _iPrinted edition:
_z9789811382901
776 0 8 _iPrinted edition:
_z9789811382918
830 0 _aSignals and Communication Technology,
_x1860-4870
_942011
856 4 0 _uhttps://doi.org/10.1007/978-981-13-8289-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77048
_d77048