Search Results for Image&nbsp;processing. - Narrowed by: Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dImage$0025C2$0025A0processing.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list 2026-03-23T19:38:11Z Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27&ndash;29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484667 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372&#160;Campilho, Aur&eacute;lio. editor. (orcid)0000-0002-5317-6275&#160;Yu, Alfred. editor. (orcid)0000-0002-8604-0219&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618103 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Barneva, Reneta P. editor.&#160;Brimkov, Valentin E. editor.&#160;Tavares, Jo&atilde;o Manuel R.S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-54609-4">https://doi.org/10.1007/978-3-319-54609-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606674 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Xenakis, Christos. editor. (orcid)0000-0001-6718-122X&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8798-2">https://doi.org/10.1007/978-981-97-8798-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606675 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Xenakis, Christos. editor. (orcid)0000-0001-6718-122X&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8801-9">https://doi.org/10.1007/978-981-97-8801-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608363 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4731-6">https://doi.org/10.1007/978-981-96-4731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608364 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4734-7">https://doi.org/10.1007/978-981-96-4734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602673 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602684 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0942-7">https://doi.org/10.1007/978-981-97-0942-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT ent://SD_ILS/0/SD_ILS:484423 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Zhang, Yushu. author.&#160;Xiang, Yong. author.&#160;Zhang, Leo Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2523-6">https://doi.org/10.1007/978-981-13-2523-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Steganography Techniques for Digital Images ent://SD_ILS/0/SD_ILS:487340 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Yahya, Abid. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:615622 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Nematollahi, Mohammad Ali. author.&#160;Vorakulpipat, Chalee. author.&#160;Rosales, Hamurabi Gamboa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:614789 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Kim, Kuinam J. editor.&#160;Wattanapongsakorn, Naruemon. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:616141 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Bas, Patrick. author.&#160;Furon, Teddy. author.&#160;Cayre, Fran&ccedil;ois. author.&#160;Do&euml;rr, Gwena&euml;l. author.&#160;Mathon, Benjamin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Audio Watermarking Based on Singular Value Decomposition ent://SD_ILS/0/SD_ILS:530260 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Dhar, Pranab Kumar. author.&#160;Shimamura, Tetsuya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334187 2026-03-23T19:38:11Z 2026-03-23T19:38:11Z Author&#160;Kirchner, Matthias. editor.&#160;Ghosal, Dipak. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334187.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>