Ben je op zoek naar transactions on data hiding and multimedia security v? Bekijk onze boeken selectie en zie direct bij welke webshop je transactions on data hiding and multimedia security v online kan kopen. Ga je voor een ebook of paperback van transactions on data hiding and multimedia security v. Zoek ook naar accesoires voor transactions on data hiding and multimedia security v. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je transactions on data hiding and multimedia security v met korting of in de aanbieding. Alles voor veel leesplezier!
new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all;
Vergelijkbare producten zoals Transactions on Data Hiding and Multimedia Security V
new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all;
Vergelijkbare producten zoals Transactions on Data Hiding and Multimedia Security X
> Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding;
Vergelijkbare producten zoals Data Hiding Fundamentals and Applications
This book lays out all the latest research in the area of multimedia data hiding. The book introduces multimedia signal processing and;
Vergelijkbare producten zoals Intelligent Multimedia Data Hiding
This book features papers presented at IIH-MSP 2018, the 14th International Conference on Intelligent Information Hiding and Multimedia;
Vergelijkbare producten zoals Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing
This book features papers presented at IIH-MSP 2018, the 14th International Conference on Intelligent Information Hiding and Multimedia;
Vergelijkbare producten zoals Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing
This book presents selected papers from the Sixteenth International Conference on Intelligent Information Hiding and Multimedia Signal;
Vergelijkbare producten zoals Advances in Intelligent Information Hiding and Multimedia Signal Processing
This book presents selected papers from the Sixteenth International Conference on Intelligent Information Hiding and Multimedia Signal;
Vergelijkbare producten zoals Advances in Intelligent Information Hiding and Multimedia Signal Processing
Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.;
Vergelijkbare producten zoals Cloud Computing and Security
Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were;
Vergelijkbare producten zoals Cloud Computing and Security
; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and;
Vergelijkbare producten zoals Artificial Intelligence and Security
; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and;
Vergelijkbare producten zoals Artificial Intelligence and Security
Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan;
Vergelijkbare producten zoals Advances in Intelligent Information Hiding and Multimedia Signal Processing
contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking;
Vergelijkbare producten zoals Digital Forensics and Watermarking
corporate and national security domains, and graduate students specializing in multimedia security and data hiding.;
Vergelijkbare producten zoals Advanced Statistical Steganalysis
This, the 37th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers;
Vergelijkbare producten zoals Transactions on Large Scale Data and Knowledge Centered Systems XXXVII
International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers;
Vergelijkbare producten zoals Cloud Computing and Security
hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.;
Vergelijkbare producten zoals Cloud Computing and Security
This book constitutes the refereed proceedings of the 5th International Conference on Multimedia Communications, Services and Security;
Vergelijkbare producten zoals Multimedia Communications, Services and Security
social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid;
Vergelijkbare producten zoals Steganography & Watermarking
This, the 30th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains six in-depth papers focusing on the;
Vergelijkbare producten zoals Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016;
Vergelijkbare producten zoals Future Data and Security Engineering
accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and;
Vergelijkbare producten zoals Data Privacy and Security
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016;
Vergelijkbare producten zoals Future Data and Security Engineering
subliminal communication. This practical resource also includes an introduction to watermarking and its methods, a means of hiding copyright data;
Vergelijkbare producten zoals Information Hiding
Conference on Future Data and Security Engineering, FDSE 2015, and the 9th International Conference on Advanced Computing and Applications, ACOMP;
Vergelijkbare producten zoals Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI
wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine;
Vergelijkbare producten zoals Transactions on Computational Collective Intelligence XXXV
Einde inhoud
Geen pagina's meer om te laden'