Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography /
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and crypt...
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2014.
|
Series: | Lecture Notes in Computer Science,
8363 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- ESSVCS: An Enriched Secret Sharing Visual Cryptography
- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images
- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares
- Password Protected Visual Cryptography via Cellular Automaton Rule 30
- A Novel Perceptual Secret Sharing Scheme
- Visual Cryptography Based Watermarking
- Flexible Visual Cryptography Scheme and Its Application.