This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the m
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters inclu