000697587 000__ 03423cam\a2200481Ki\4500 000697587 001__ 697587 000697587 005__ 20230306135746.0 000697587 006__ m\\\\\o\\d\\\\\\\\ 000697587 007__ cr\cnu|||unuuu 000697587 008__ 140415s2014\\\\gw\a\\\\o\\\\\000\0\eng\d 000697587 0167_ $$a016698065$$2Uk 000697587 020__ $$a9783642550461 $$qelectronic book 000697587 020__ $$a3642550460 $$qelectronic book 000697587 020__ $$z9783642550454 000697587 0247_ $$a10.1007/978-3-642-55046-1$$2doi 000697587 035__ $$aSP(OCoLC)ocn876733052 000697587 035__ $$aSP(OCoLC)876733052 000697587 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dUKMGB$$dCOO 000697587 049__ $$aISEA 000697587 050_4 $$aQA76.9.A25 000697587 08204 $$a005.82$$223 000697587 24500 $$aTransactions on data hiding and multimedia security IX$$h[electronic resource] :$$bSpecial Issue on Visual Cryptography /$$cYun Q. Shi (editor-in-chief); Feng Liu, Weiqi Yan (guest editors). 000697587 2463_ $$aTransactions on data hiding and multimedia security 9 000697587 264_1 $$aHeidelberg :$$bSpringer,$$c2014. 000697587 300__ $$a1 online resource (x, 131 pages) :$$billustrations. 000697587 336__ $$atext$$btxt$$2rdacontent 000697587 337__ $$acomputer$$bc$$2rdamedia 000697587 338__ $$aonline resource$$bcr$$2rdacarrier 000697587 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8363 000697587 5050_ $$aESSVCS: An Enriched Secret Sharing Visual Cryptography -- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images -- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares -- Password Protected Visual Cryptography via Cellular Automaton Rule 30 -- A Novel Perceptual Secret Sharing Scheme -- Visual Cryptography Based Watermarking -- Flexible Visual Cryptography Scheme and Its Application. 000697587 506__ $$aAccess limited to authorized users. 000697587 520__ $$aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research. 000697587 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed March 31, 2014). 000697587 650_0 $$aData encryption (Computer science) 000697587 650_0 $$aMultimedia systems$$xSecurity measures. 000697587 7001_ $$aShi, Yun Q.,$$eeditor of compilation. 000697587 7001_ $$aLiu, Feng,$$eeditor of compilation. 000697587 7001_ $$aYan, Weiqi,$$eeditor of compilation. 000697587 830_0 $$aLecture notes in computer science ;$$v8363.$$x0302-9743 000697587 85280 $$bebk$$hSpringerLink 000697587 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-642-55046-1$$zOnline Access 000697587 909CO $$ooai:library.usi.edu:697587$$pGLOBAL_SET 000697587 980__ $$aEBOOK 000697587 980__ $$aBIB 000697587 982__ $$aEbook 000697587 983__ $$aOnline 000697587 994__ $$a92$$bISE