Search Results for Image. - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dImage.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?
2024-09-18T01:11:56Z
Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484667
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Karray, Fakhri. editor. (orcid)0000-0002-4217-1372 Campilho, Aurélio. editor. (orcid)0000-0002-5317-6275 Yu, Alfred. editor. (orcid)0000-0002-8604-0219 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
ent://SD_ILS/0/SD_ILS:164920
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
ent://SD_ILS/0/SD_ILS:484423
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Zhang, Yushu. author. Xiang, Yong. author. Zhang, Leo Yu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2523-6">https://doi.org/10.1007/978-981-13-2523-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Steganography Techniques for Digital Images
ent://SD_ILS/0/SD_ILS:487340
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Yahya, Abid. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78597-4">https://doi.org/10.1007/978-3-319-78597-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded Multimedia Security Systems Algorithms and Architectures
ent://SD_ILS/0/SD_ILS:330984
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Pande, Amit. author. Zambreno, Joseph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334187
2024-09-18T01:11:56Z
2024-09-18T01:11:56Z
Author Kirchner, Matthias. editor. Ghosal, Dipak. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334187.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>