![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion
In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...
-
Chapter
Surveillance Privacy Protection
Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More...
-
Chapter and Conference Paper
A Novel Agent-Based Framework in Bridge-Mode Hypervisors of Cloud Security
Cloud computing has been introduced as a tool for improving IT proficiency and business responsiveness for organizations as it delivers flexible hardware and software services as well as providing an array of ...
-
Chapter and Conference Paper
Authenticating Visual Cryptography Shares Using 2D Barcodes
One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an imag...
-
Chapter and Conference Paper
Plane Transform Visual Cryptography
Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is...
-
Chapter and Conference Paper
A Novel Collusion Attack Strategy for Digital Fingerprinting
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against dig...
-
Chapter
Partial Palmprint Matching Using Invariant Local Minutiae Descriptors
In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular ...
-
Chapter
A Comprehensive Study of Visual Cryptography
Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides i...
-
Chapter
Secure Masks for Visual Cryptography
Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactl...
-
Chapter and Conference Paper
Digital Image Splicing Using Edges
In this paper we splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge searching and matching. For the pieces that hav...
-
Chapter and Conference Paper
Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank
This paper introduces a new technique for palmprint recognition based on Fisher Linear Discriminant Analysis (FLDA) of Gabor filter bank. This method involves convolving a palmprint image with a bank of Gabor ...
-
Chapter
Finite Element Modelling in Implant Dentistry
The use of numerical methods such as FEA has been adopted in solving complicated geometric problems, for which it is very difficult to achieve an analytical solution. FEA is a technique for obtaining a solutio...
-
Chapter
Applications to Implant Dentistry
Although the precise mechanisms are not fully understood, it is clear that there is an adaptive remodelling response of surrounding bone to stresses. Implant features causing excessive high or low stresses can...