1. Visual cryptography from halftone error diffusion / Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo --; 2. Visual cryptography for color images / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --; 3. Visual cryptography for multiple secrets / Shyong Jian Shyu --; 4. Extended visual cryptography for photograph images / Yasushi Yamaguchi --; 5. Probabilistic visual cryptography schemes / Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis --; 6. XOR-based visual cryptography / Daoshun Wang and Lin Dong --; 7. Visual cryptography and random grids / Shyong Jian Shyu --; 8. Visual cryptography and contrast bounds / Andreas Klein --; 9. Visual cryptography schemes with reversing / Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci --; 10. Cheating prevention in visual cryptography / Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai --; 11. Resolving the alignment problem in visual cryptography / Feng Liu --; 12. Applications of visual cryptography / Bernd Borchert and Klaus Reinhardt --; 13. Steganography in halftone images / Oscar C. Au, Yuanfang Guo, and John S. Ho --; 14. Image secret sharing / WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli --; 15. Polynomial-based image sharing / Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen --; 16. Image sharing with steganography and authentication / Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang --; 17. Two-decoding-option image sharing method / Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen.
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses:Potential for sharing multiple secretsVisual cryptography schemes based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared imagesInclusion of pictures in the distributed sharesContrast enhancement techniquesColor-image visual cryptographyCheating preventionAlignment problems for image sharesSteganography and authenticationIn the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field--