Cryptography: breakthroughs in research and practice
""This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | ""This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799817642 |
DOI: | 10.4018/978-1-7998-1763-5 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046346606 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | cr|uuu---uuuuu | ||
008 | 200121s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799817642 |9 978-1-7998-1764-2 | ||
035 | |a (OCoLC)1137833827 | ||
035 | |a (DE-599)BVBBV046346606 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Cryptography |b breakthroughs in research and practice |c Information Resources Management Association, USA |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Section 1. Chaotic and DNA-based cryptography. Chapter 1. Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption ; Chapter 2. Chaotic function based ECG encryption system ; Chapter 3. Biometric image security using chaos algorithm ; Chapter 4. DNA sequence based cryptographic solution for secure image transmission ; Chapter 5. Iphdbcm: inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks -- | |
505 | 8 | |a Section 2. Cryptographic algorithms. Chapter 6. Cryptographic techniques based on bio-inspired systems ; Chapter 7. Modification of traditional RSA into symmetric-RSA cryptosystems ; Chapter 8. Hybrid approach of modified AES ; Chapter 9. Cryptographic algorithms for next generation wireless networks security ; Chapter 10. Efficient energy saving cryptographic techniques with software solution in wireless network ; Chapter 11. Applicability of cellular automata in cryptanalysis -- | |
505 | 8 | |a Section 3. Encryption keys and homomorphic encryption. Chapter 12. A novel approach of symmetric key cryptography using genetic algorithm implemented on GPGPU ; Chapter 13. Provable security for public key cryptosystems: how to prove that the cryptosystem is secure ; Chapter 14. Towards parameterized shared key for AVK approach ; Chapter 15. Authentication of smart grid: the case for using Merkle trees ; Chapter 16. Secure speaker recognition using BGN cryptosystem with prime order bilinear group ; Chapter 17. A pairing-based homomorphic encryption scheme for multi-user settings ; Chapter 18. A secure cloud storage using ECC-based homomorphic encryption ; Chapter 19. Homomorphic encryption as a service for outsourced images in mobile cloud computing environment -- | |
505 | 8 | |a Section 4. Steganography. Chapter 20. Digital image steganography: survey, analysis, and application ; Chapter 21. Improved secure data transfer using video steganographic technique ; Chapter 22. Secure group message transfer stegosystem ; Chapter 23. Implementation and evaluation of steganography based online voting system -- | |
505 | 8 | |a Section 5. Visual cryptography. Chapter 24. Exploiting the homomorphic property of visual cryptography ; Chapter 25. Basic visual cryptography using Braille ; Chapter 26. Threshold secret sharing scheme for compartmented access structures ; Chapter 27. An improved size invariant (n, n) extended visual cryptography scheme ; Chapter 28. A methodological evaluation of crypto-watermarking system for medical images ; Chapter 29. Reversible watermarking in medical image using RDWT and sub-sample ; Chapter 30. Video saliency detection for visual cryptography-based watermarking ; Chapter 31. On the pixel expansion of visual cryptography scheme ; Chapter 32. A novel pixel merging-based lossless recovery algorithm for basic matrix VSS ; Chapter 33. A contemplator on topical image encryption measures | |
520 | |a ""This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"-- | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Data transmission systems / Security measures | |
650 | 4 | |a Computers / Access control | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data transmission systems / Security measures |2 fast | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-1763-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-1763-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-1763-5 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-1763-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-1763-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-1763-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076697513459712 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV046346606 |
collection | ZDB-98-IGB |
contents | Section 1. Chaotic and DNA-based cryptography. Chapter 1. Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption ; Chapter 2. Chaotic function based ECG encryption system ; Chapter 3. Biometric image security using chaos algorithm ; Chapter 4. DNA sequence based cryptographic solution for secure image transmission ; Chapter 5. Iphdbcm: inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks -- Section 2. Cryptographic algorithms. Chapter 6. Cryptographic techniques based on bio-inspired systems ; Chapter 7. Modification of traditional RSA into symmetric-RSA cryptosystems ; Chapter 8. Hybrid approach of modified AES ; Chapter 9. Cryptographic algorithms for next generation wireless networks security ; Chapter 10. Efficient energy saving cryptographic techniques with software solution in wireless network ; Chapter 11. Applicability of cellular automata in cryptanalysis -- Section 3. Encryption keys and homomorphic encryption. Chapter 12. A novel approach of symmetric key cryptography using genetic algorithm implemented on GPGPU ; Chapter 13. Provable security for public key cryptosystems: how to prove that the cryptosystem is secure ; Chapter 14. Towards parameterized shared key for AVK approach ; Chapter 15. Authentication of smart grid: the case for using Merkle trees ; Chapter 16. Secure speaker recognition using BGN cryptosystem with prime order bilinear group ; Chapter 17. A pairing-based homomorphic encryption scheme for multi-user settings ; Chapter 18. A secure cloud storage using ECC-based homomorphic encryption ; Chapter 19. Homomorphic encryption as a service for outsourced images in mobile cloud computing environment -- Section 4. Steganography. Chapter 20. Digital image steganography: survey, analysis, and application ; Chapter 21. Improved secure data transfer using video steganographic technique ; Chapter 22. Secure group message transfer stegosystem ; Chapter 23. Implementation and evaluation of steganography based online voting system -- Section 5. Visual cryptography. Chapter 24. Exploiting the homomorphic property of visual cryptography ; Chapter 25. Basic visual cryptography using Braille ; Chapter 26. Threshold secret sharing scheme for compartmented access structures ; Chapter 27. An improved size invariant (n, n) extended visual cryptography scheme ; Chapter 28. A methodological evaluation of crypto-watermarking system for medical images ; Chapter 29. Reversible watermarking in medical image using RDWT and sub-sample ; Chapter 30. Video saliency detection for visual cryptography-based watermarking ; Chapter 31. On the pixel expansion of visual cryptography scheme ; Chapter 32. A novel pixel merging-based lossless recovery algorithm for basic matrix VSS ; Chapter 33. A contemplator on topical image encryption measures |
ctrlnum | (OCoLC)1137833827 (DE-599)BVBBV046346606 |
doi_str_mv | 10.4018/978-1-7998-1763-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046346606</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200121s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799817642</subfield><subfield code="9">978-1-7998-1764-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1137833827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046346606</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="b">breakthroughs in research and practice</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 1. Chaotic and DNA-based cryptography. Chapter 1. Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption ; Chapter 2. Chaotic function based ECG encryption system ; Chapter 3. Biometric image security using chaos algorithm ; Chapter 4. DNA sequence based cryptographic solution for secure image transmission ; Chapter 5. Iphdbcm: inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 2. Cryptographic algorithms. Chapter 6. Cryptographic techniques based on bio-inspired systems ; Chapter 7. Modification of traditional RSA into symmetric-RSA cryptosystems ; Chapter 8. Hybrid approach of modified AES ; Chapter 9. Cryptographic algorithms for next generation wireless networks security ; Chapter 10. Efficient energy saving cryptographic techniques with software solution in wireless network ; Chapter 11. Applicability of cellular automata in cryptanalysis --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 3. Encryption keys and homomorphic encryption. Chapter 12. A novel approach of symmetric key cryptography using genetic algorithm implemented on GPGPU ; Chapter 13. Provable security for public key cryptosystems: how to prove that the cryptosystem is secure ; Chapter 14. Towards parameterized shared key for AVK approach ; Chapter 15. Authentication of smart grid: the case for using Merkle trees ; Chapter 16. Secure speaker recognition using BGN cryptosystem with prime order bilinear group ; Chapter 17. A pairing-based homomorphic encryption scheme for multi-user settings ; Chapter 18. A secure cloud storage using ECC-based homomorphic encryption ; Chapter 19. Homomorphic encryption as a service for outsourced images in mobile cloud computing environment --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 4. Steganography. Chapter 20. Digital image steganography: survey, analysis, and application ; Chapter 21. Improved secure data transfer using video steganographic technique ; Chapter 22. Secure group message transfer stegosystem ; Chapter 23. Implementation and evaluation of steganography based online voting system --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 5. Visual cryptography. Chapter 24. Exploiting the homomorphic property of visual cryptography ; Chapter 25. Basic visual cryptography using Braille ; Chapter 26. Threshold secret sharing scheme for compartmented access structures ; Chapter 27. An improved size invariant (n, n) extended visual cryptography scheme ; Chapter 28. A methodological evaluation of crypto-watermarking system for medical images ; Chapter 29. Reversible watermarking in medical image using RDWT and sub-sample ; Chapter 30. Video saliency detection for visual cryptography-based watermarking ; Chapter 31. On the pixel expansion of visual cryptography scheme ; Chapter 32. A novel pixel merging-based lossless recovery algorithm for basic matrix VSS ; Chapter 33. A contemplator on topical image encryption measures</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">""This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data transmission systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-1763-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-1763-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-1763-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-1763-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-1763-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-1763-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046346606 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:01:25Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781799817642 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031723181 |
oclc_num | 1137833827 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Cryptography breakthroughs in research and practice Information Resources Management Association, USA Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Section 1. Chaotic and DNA-based cryptography. Chapter 1. Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption ; Chapter 2. Chaotic function based ECG encryption system ; Chapter 3. Biometric image security using chaos algorithm ; Chapter 4. DNA sequence based cryptographic solution for secure image transmission ; Chapter 5. Iphdbcm: inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks -- Section 2. Cryptographic algorithms. Chapter 6. Cryptographic techniques based on bio-inspired systems ; Chapter 7. Modification of traditional RSA into symmetric-RSA cryptosystems ; Chapter 8. Hybrid approach of modified AES ; Chapter 9. Cryptographic algorithms for next generation wireless networks security ; Chapter 10. Efficient energy saving cryptographic techniques with software solution in wireless network ; Chapter 11. Applicability of cellular automata in cryptanalysis -- Section 3. Encryption keys and homomorphic encryption. Chapter 12. A novel approach of symmetric key cryptography using genetic algorithm implemented on GPGPU ; Chapter 13. Provable security for public key cryptosystems: how to prove that the cryptosystem is secure ; Chapter 14. Towards parameterized shared key for AVK approach ; Chapter 15. Authentication of smart grid: the case for using Merkle trees ; Chapter 16. Secure speaker recognition using BGN cryptosystem with prime order bilinear group ; Chapter 17. A pairing-based homomorphic encryption scheme for multi-user settings ; Chapter 18. A secure cloud storage using ECC-based homomorphic encryption ; Chapter 19. Homomorphic encryption as a service for outsourced images in mobile cloud computing environment -- Section 4. Steganography. Chapter 20. Digital image steganography: survey, analysis, and application ; Chapter 21. Improved secure data transfer using video steganographic technique ; Chapter 22. Secure group message transfer stegosystem ; Chapter 23. Implementation and evaluation of steganography based online voting system -- Section 5. Visual cryptography. Chapter 24. Exploiting the homomorphic property of visual cryptography ; Chapter 25. Basic visual cryptography using Braille ; Chapter 26. Threshold secret sharing scheme for compartmented access structures ; Chapter 27. An improved size invariant (n, n) extended visual cryptography scheme ; Chapter 28. A methodological evaluation of crypto-watermarking system for medical images ; Chapter 29. Reversible watermarking in medical image using RDWT and sub-sample ; Chapter 30. Video saliency detection for visual cryptography-based watermarking ; Chapter 31. On the pixel expansion of visual cryptography scheme ; Chapter 32. A novel pixel merging-based lossless recovery algorithm for basic matrix VSS ; Chapter 33. A contemplator on topical image encryption measures ""This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"-- Cryptography Data transmission systems / Security measures Computers / Access control Computers / Access control fast Cryptography fast Data transmission systems / Security measures fast Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-1763-5 https://doi.org/10.4018/978-1-7998-1763-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cryptography breakthroughs in research and practice Section 1. Chaotic and DNA-based cryptography. Chapter 1. Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption ; Chapter 2. Chaotic function based ECG encryption system ; Chapter 3. Biometric image security using chaos algorithm ; Chapter 4. DNA sequence based cryptographic solution for secure image transmission ; Chapter 5. Iphdbcm: inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks -- Section 2. Cryptographic algorithms. Chapter 6. Cryptographic techniques based on bio-inspired systems ; Chapter 7. Modification of traditional RSA into symmetric-RSA cryptosystems ; Chapter 8. Hybrid approach of modified AES ; Chapter 9. Cryptographic algorithms for next generation wireless networks security ; Chapter 10. Efficient energy saving cryptographic techniques with software solution in wireless network ; Chapter 11. Applicability of cellular automata in cryptanalysis -- Section 3. Encryption keys and homomorphic encryption. Chapter 12. A novel approach of symmetric key cryptography using genetic algorithm implemented on GPGPU ; Chapter 13. Provable security for public key cryptosystems: how to prove that the cryptosystem is secure ; Chapter 14. Towards parameterized shared key for AVK approach ; Chapter 15. Authentication of smart grid: the case for using Merkle trees ; Chapter 16. Secure speaker recognition using BGN cryptosystem with prime order bilinear group ; Chapter 17. A pairing-based homomorphic encryption scheme for multi-user settings ; Chapter 18. A secure cloud storage using ECC-based homomorphic encryption ; Chapter 19. Homomorphic encryption as a service for outsourced images in mobile cloud computing environment -- Section 4. Steganography. Chapter 20. Digital image steganography: survey, analysis, and application ; Chapter 21. Improved secure data transfer using video steganographic technique ; Chapter 22. Secure group message transfer stegosystem ; Chapter 23. Implementation and evaluation of steganography based online voting system -- Section 5. Visual cryptography. Chapter 24. Exploiting the homomorphic property of visual cryptography ; Chapter 25. Basic visual cryptography using Braille ; Chapter 26. Threshold secret sharing scheme for compartmented access structures ; Chapter 27. An improved size invariant (n, n) extended visual cryptography scheme ; Chapter 28. A methodological evaluation of crypto-watermarking system for medical images ; Chapter 29. Reversible watermarking in medical image using RDWT and sub-sample ; Chapter 30. Video saliency detection for visual cryptography-based watermarking ; Chapter 31. On the pixel expansion of visual cryptography scheme ; Chapter 32. A novel pixel merging-based lossless recovery algorithm for basic matrix VSS ; Chapter 33. A contemplator on topical image encryption measures Cryptography Data transmission systems / Security measures Computers / Access control Computers / Access control fast Cryptography fast Data transmission systems / Security measures fast |
title | Cryptography breakthroughs in research and practice |
title_auth | Cryptography breakthroughs in research and practice |
title_exact_search | Cryptography breakthroughs in research and practice |
title_full | Cryptography breakthroughs in research and practice Information Resources Management Association, USA |
title_fullStr | Cryptography breakthroughs in research and practice Information Resources Management Association, USA |
title_full_unstemmed | Cryptography breakthroughs in research and practice Information Resources Management Association, USA |
title_short | Cryptography |
title_sort | cryptography breakthroughs in research and practice |
title_sub | breakthroughs in research and practice |
topic | Cryptography Data transmission systems / Security measures Computers / Access control Computers / Access control fast Cryptography fast Data transmission systems / Security measures fast |
topic_facet | Cryptography Data transmission systems / Security measures Computers / Access control |
url | https://doi.org/10.4018/978-1-7998-1763-5 |
work_keys_str_mv | AT informationresourcesmanagementassociation cryptographybreakthroughsinresearchandpractice |