Search Results for Computer vision. - Narrowed by: SpringerLink (Online service) - Data encryption (Computer science). - Multimedia systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bvision.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Multimedia$002bsystems.$002509Multimedia$002bsystems.$0026ic$003dtrue$0026ps$003d300? 2024-09-09T13:52:16Z Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334187 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Kirchner, Matthias. editor.&#160;Ghosal, Dipak. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334187.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:167461 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author.&#160;Nandakumar, Karthik. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77326-1">http://dx.doi.org/10.1007/978-0-387-77326-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Automation International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194178 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19853-3">http://dx.doi.org/10.1007/978-3-642-19853-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195570 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Filler, Tom&aacute;&scaron;. editor.&#160;Pevn&yacute;, Tom&aacute;&scaron;. editor.&#160;Craver, Scott. editor.&#160;Ker, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24178-9">http://dx.doi.org/10.1007/978-3-642-24178-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193294 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Fong, Philip W. L. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16435-4">http://dx.doi.org/10.1007/978-3-642-16435-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing Biometrics Applications ent://SD_ILS/0/SD_ILS:166745 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Shoniregun, Charles A. author.&#160;Crosier, Stephen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Biometrics ent://SD_ILS/0/SD_ILS:166799 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Jain, Anil K. editor.&#160;Flynn, Patrick. editor.&#160;Ross, Arun A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:165467 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Vielhauer, Claus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unconstrained Face Recognition ent://SD_ILS/0/SD_ILS:165650 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Zhou, Shaohua Kevin. author.&#160;Chellappa, Rama. author.&#160;Zhao, Wenyi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Multibiometrics ent://SD_ILS/0/SD_ILS:165914 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Ross, Arun A. author.&#160;Jain, Anil K. author.&#160;Nandakumar, Karthik. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication ent://SD_ILS/0/SD_ILS:164920 2024-09-09T13:52:16Z 2024-09-09T13:52:16Z Author&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>