Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography /

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and crypt...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Shi, Yun Q. (Editor), Liu, Feng (Editor), Yan, Weiqi (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Series:Lecture Notes in Computer Science, 8363
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • ESSVCS: An Enriched Secret Sharing Visual Cryptography
  • Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images
  • Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares
  • Password Protected Visual Cryptography via Cellular Automaton Rule 30
  • A Novel Perceptual Secret Sharing Scheme
  • Visual Cryptography Based Watermarking
  • Flexible Visual Cryptography Scheme and Its Application.