Ching-Nung Yang - Böcker
Visar alla böcker från författaren Ching-Nung Yang. Handla med fri frakt och snabb leverans.
6 produkter
6 produkter
1 186 kr
Skickas inom 10-15 vardagar
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
3 050 kr
Skickas inom 10-15 vardagar
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.
Del 895 - Advances in Intelligent Systems and Computing
Security with Intelligent Computing and Big-data Services
Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018)
Häftad, Engelska, 2019
2 163 kr
Skickas inom 10-15 vardagar
This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.
Del 9023 - Lecture Notes in Computer Science
Digital-Forensics and Watermarking
13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
Häftad, Engelska, 2015
551 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions.
Del 21 - Smart Innovation, Systems and Technologies
Advances in Intelligent Systems and Applications - Volume 2
Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012
Inbunden, Engelska, 2012
3 241 kr
Skickas inom 10-15 vardagar
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics: l Authentication, Identification, and Signaturel Intrusion Detectionl Steganography, Data Hiding, and Watermarkingl Database, System, and Communication Securityl Computer Vision, Object Tracking, and Pattern Recognitionl Image Processing, Medical Image Processing, and Video Codingl Digital Content, Digital Life, and Human Computer Interactionl Parallel, Peer-to-peer, Distributed, and Cloud Computingl Software Engineering and Programming Language This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
Del 21 - Smart Innovation, Systems and Technologies
Advances in Intelligent Systems and Applications - Volume 2
Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012
Häftad, Engelska, 2016
3 241 kr
Skickas inom 10-15 vardagar
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics: l Authentication, Identification, and Signaturel Intrusion Detectionl Steganography, Data Hiding, and Watermarkingl Database, System, and Communication Securityl Computer Vision, Object Tracking, and Pattern Recognitionl Image Processing, Medical Image Processing, and Video Codingl Digital Content, Digital Life, and Human Computer Interactionl Parallel, Peer-to-peer, Distributed, and Cloud Computingl Software Engineering and Programming Language This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.