ebook img

Handbook of Image-based Security Techniques PDF

443 Pages·2018·9.54 MB·English
by  Agarwal
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook of Image-based Security Techniques

Handbook of Image-Based Security Techniques Handbook of Image-Based Security Techniques Shivendra Shivani Suneeta Agarwal Jasjit S. Suri MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MATLAB® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software. CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2018 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20180427 International Standard Book Number-13: 978-1-1-38-05421-9 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To my beloved family members for encouraging and admiring me to believe that I am capable of authoring a book. Shivendra Shivani To my husband for his untiring effort and support. Suneeta Agarwal To all my collaborators around the world. Jasjit S. Suri Contents Foreword xxiii Preface xxv Authors xxix Section I Visual Cryptography hapter C 1(cid:4) Visual Cryptography: Introduction 3 1.1 INTRODUCTION 4 1.2 VISUALCRYPTOGRAPHY 5 1.3 APPLICATIONSOFVISUALCRYPTOGRAPHY 7 1.3.1 Trojan-Free Secure Transaction 7 1.3.2 Authentication 10 1.3.3 Access Control 11 1.3.4 Transaction Tracking 11 1.3.5 Watermarking 11 1.4 PRELIMINARIES 11 1.5 FUNDAMENTALPRINCIPLESOFVISUALSECRET SHARING 13 1.5.1 Pixels Expansion m 13 1.5.2 Contrast α 14 1.5.3 Basis Matrices 15 1.5.4 Concept of Black and White Pixels in Visual Cryptography 16 1.6 FORMATIONOFABASISMATRIX 16 1.6.1 Observations Related to The Basis Matrix Creation Approach of Naor and Shamir 17 1.6.2 Essential Conditions for a Basis Matrix 18 vii viii (cid:4) Contents 1.7 DIFFERENTEVALUATIONPARAMETERS 19 1.7.1 Objective Evaluation Parameters 19 1.7.2 Subjective Parameters 23 hapter C 2(cid:4) Various Dimensions of Visual Cryptography 27 2.1 VARIOUSDIMENSIONSOFVISUALCRYPTOGRAPHY 28 2.1.1 Traditional Visual Cryptography (TVC) 29 2.1.1.1 Threshold visual cryptography 30 2.1.2 Extended Visual Cryptography (EVC) 32 2.1.2.1 Halftone visual cryptography (HVC) 32 2.1.2.2 Significance of a halftone image over a binary image 33 2.1.2.3 Halftone image creation using error diffusion 33 2.1.2.4 Tagged visual cryptography (TVC) 37 2.1.2.5 Friendly visual cryptography (FVC) 39 2.1.2.6 Size invariant visual cryptography 39 2.1.2.7 Progressive visual cryptography (PVC) 42 2.1.2.8 Progressive visual cryptography with meaningful shares without pixel expan- sion 43 2.1.3 Dynamic Visual Cryptography (DVC) 47 2.1.3.1 Multitone/Continuous tone visual cryptography (MVC) 47 2.1.3.2 MVCwithunexpandedmeaningfulshares 49 2.1.3.3 Perfect recovery of the secret image in MVC 50 2.1.3.4 Visual cryptography with multiple se- crets or multi secret sharing (MSS) 51 2.1.3.5 Angle restriction problem in MSS 51 2.1.3.6 Multi secret sharing with unexpanded meaningful shares 54 2.1.3.7 XOR-based visual cryptography 54 2.1.3.8 Hybrid approach with XOR-based VC, multitone VC, FVC, size invariant VC and multi secret sharing 56 2.1.3.9 Verifiable visual cryptography (VVC) 57 Contents (cid:4) ix 2.1.3.10 Hybrid approach with VVC 60 2.1.3.11 Random grid-based visual cryptography (RGVC) 60 2.1.3.12 Hybrid approaches using RGVC 61 hapter C 3(cid:4) VC Approaches with Computationless Recovery of Secrets 65 3.1 COMPUTATIONLESSANDCOMPUTATION-BASED VISUALCRYPTOGRAPHYAPPROACHES 66 3.2 BASICS FOR THE DEVELOPMENT OF COMPUTATION- LESSVCAPPROACHES 68 3.2.1 Development of Threshold Visual Cryptography 68 3.2.2 Development of a Halftone Visual Cryptography (HVC) Scheme 74 3.2.3 Development of a Friendly Visual Cryptography (FVC) Scheme 77 3.2.4 Development of Size Invariant Visual Cryptography 80 3.2.4.1 Preprocessing of secret image for size invariant visual cryptography 80 3.2.4.2 Size invariant share generation with the help of the preprocessed secret 84 3.2.5 Development of a Hybrid Approach Using Friendly Visual Cryptography (FVC) and Size Invariant Visual Cryptography 86 3.2.5.1 Steps for making a hybrid approach 86 3.2.6 Development of Random Grid-Based Visual Cryptography 91 3.2.6.1 Steps to generate shares using a random grid 93 3.2.7 Development of Visual Cryptography with Multiple Secrets 95 3.2.7.1 Steps to generate shares for multiple secrets 95 3.2.8 Development of Progressive Visual Cryptography (PVC) 100

Description:
"This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.