000911484 000__ 01458cam\a2200397Ia\4500 000911484 001__ 911484 000911484 005__ 20210515183423.0 000911484 006__ m\\\\\o\\d\\\\\\\\ 000911484 007__ cr\cn\nnnunnun 000911484 008__ 110822s2012\\\\flua\\\\ob\\\\001\0\eng\d 000911484 010__ $$z 2011029864 000911484 020__ $$z9781439837214 000911484 020__ $$z143983721X 000911484 035__ $$a(MiAaPQ)EBC1449352 000911484 035__ $$a(Au-PeEL)EBL1449352 000911484 035__ $$a(CaPaEBR)ebr10502478 000911484 035__ $$a(CaONFJC)MIL331163 000911484 035__ $$a(OCoLC)899156225 000911484 040__ $$aMiAaPQ$$cMiAaPQ$$dMiAaPQ 000911484 050_4 $$aTA1637$$b.V544 2012 000911484 08204 $$a005.8/2$$223 000911484 24500 $$aVisual cryptography and secret image sharing$$h[electronic resource] /$$cedited by Stelvio Cimato, Ching-Nung Yang. 000911484 260__ $$aBoca Raton, FL :$$bCRC Press,$$cc2012. 000911484 300__ $$axxxvi, 486 p. :$$bill. 000911484 4900_ $$aDigital imaging and computer vision 000911484 504__ $$aIncludes bibliographical references and index. 000911484 506__ $$aAccess limited to authorized users. 000911484 650_0 $$aImage processing$$xSecurity measures. 000911484 650_0 $$aData encryption (Computer science) 000911484 650_0 $$aComputer file sharing$$xSecurity measures. 000911484 650_0 $$aImage files$$xSecurity measures. 000911484 7001_ $$aCimato, Stelvio. 000911484 7001_ $$aYang, Ching-Nung. 000911484 852__ $$bebk 000911484 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1449352$$zOnline Access 000911484 909CO $$ooai:library.usi.edu:911484$$pGLOBAL_SET 000911484 980__ $$aEBOOK 000911484 980__ $$aBIB 000911484 982__ $$aEbook 000911484 983__ $$aOnline