Search Results for Image&nbsp;processing. - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dImage$0025C2$0025A0processing.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2026-01-24T03:01:46Z Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27&ndash;29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484667 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372&#160;Campilho, Aur&eacute;lio. editor. (orcid)0000-0002-5317-6275&#160;Yu, Alfred. editor. (orcid)0000-0002-8604-0219&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT ent://SD_ILS/0/SD_ILS:484423 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Zhang, Yushu. author.&#160;Xiang, Yong. author.&#160;Zhang, Leo Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2523-6">https://doi.org/10.1007/978-981-13-2523-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Steganography Techniques for Digital Images ent://SD_ILS/0/SD_ILS:487340 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Yahya, Abid. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Audio Watermarking Based on Singular Value Decomposition ent://SD_ILS/0/SD_ILS:530260 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Dhar, Pranab Kumar. author.&#160;Shimamura, Tetsuya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334187 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Kirchner, Matthias. editor.&#160;Ghosal, Dipak. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334187.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2026-01-24T03:01:46Z 2026-01-24T03:01:46Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>