Mostrando 41 - 60 Resultados de 993 Para Buscar '"Hide"', tiempo de consulta: 0.06s Limitar resultados
  1. 41
  2. 42
    Publicado 1988
    Libro
  3. 43
    Publicado 2024
    Libro electrónico
  4. 44
    por Hide, M. Ch
    Publicado 1855
    Accés Lliure
    Libro
  5. 45
    Publicado 2020
    “…The workshop focuses on information hiding topics, such as digital watermarking, steganography, steganalysis, anonymity, hard-to-intercept communications, and covert/subliminal channels. …”
    Libro electrónico
  6. 46
    Publicado 2012
    Libro
  7. 47
    Libro electrónico
  8. 48
    por Mack, Ruth P. 1903-2003
    Publicado 1956
    Libro
  9. 49
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Lossless Information Hiding in Images -- Lossless InformationHiding in Images -- Copyright -- Contents -- Preface -- 1 - Introduction -- 1.1 BACKGROUND -- 1.1.1 DEFINITION OF IMAGES -- 1.1.1.1 Images -- 1.1.1.2 Digital Images -- 1.1.2 IMAGE PROCESSING AND IMAGE ANALYSIS -- 1.1.2.1 Image Processing in a Broad Sense -- 1.1.2.2 Image Processing in a Narrow Sense -- 1.1.2.2.1 Image Enhancement -- 1.1.2.2.2 Image Restoration -- 1.1.2.2.3 Image Compression -- 1.1.2.3 Image Analysis -- 1.1.3 NETWORK INFORMATION SECURITY -- 1.1.4 IMAGE PROTECTION AND IMAGE AUTHENTICATION -- 1.1.4.1 Image Protection -- 1.1.4.2 Image Authentication -- 1.2 OVERVIEW OF INFORMATION HIDING -- 1.2.1 BASIC CONCEPTS RELATED TO INFORMATION HIDING -- 1.2.2 PROPERTIES AND REQUIREMENTS OF INFORMATION HIDING -- 1.2.3 INFORMATION HIDING MODELS -- 1.2.3.1 Prisoner's Model -- 1.2.3.2 General Model -- 1.2.3.3 Communication-Based Models -- 1.2.4 RESEARCH BRANCHES OF INFORMATION HIDING -- 1.2.4.1 Steganography -- 1.2.4.2 Copyright Marking -- 1.2.4.3 Covert Channel -- 1.2.4.4 Subliminal Channel -- 1.2.4.5 Anonymous Communication -- 1.2.5 CLASSIFICATION OF INFORMATION HIDING TECHNOLOGIES -- 1.2.5.1 Classification According to the Types of Cover Objects -- 1.2.5.2 Classification According to the Symmetry of Keys -- 1.2.5.3 Classification According to the Embedding Domains -- 1.2.5.4 Classification Based on Other Ways -- 1.2.6 APPLICATIONS OF INFORMATION HIDING TECHNIQUES -- 1.2.6.1 Covert Communication -- 1.2.6.2 Broadcast Monitoring -- 1.2.6.3 Owner Identification -- 1.2.6.4 Ownership Verification -- 1.2.6.5 Transaction Tracking -- 1.2.6.6 Content Authentication -- 1.2.6.7 Annotation -- 1.2.6.8 Copy Control -- 1.2.6.9 Device Control -- 1.3 OVERVIEW OF IMAGE CODING AND COMPRESSION TECHNIQUES -- 1.3.1 SOURCE CODING AND DATA COMPRESSION -- 1.3.2 LOSSLESS IMAGE CODING TECHNIQUES…”
    Libro electrónico
  10. 50
    por Hidé
    Publicado 1854
    Accés Lliure
    Libro
  11. 51
    Publicado 2018
    Libro electrónico
  12. 52
    Publicado 1989
    Libro
  13. 53
    por Kite, Marion
    Publicado 2006
    Materias: Enlace del recurso
    Libro electrónico
  14. 54
    Libro
  15. 55
    por Loshin, Peter
    Publicado 2013
    Libro electrónico
  16. 56
    por Wayner, Peter, 1964-
    Publicado 2009
    “…Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …”
    Libro electrónico
  17. 57
    por Wayner, Peter, 1964-
    Publicado 2002
    Tabla de Contenidos: “…Life in the Noise; Boy-Zs in Noizy, Idaho; 9.1 Hiding in the Noise; 9.2 Bit Twiddling; 9.3 Summary; Chapter 10. …”
    Libro electrónico
  18. 58
    por Balentine, Samuel E.
    Publicado 1983
    Libro
  19. 59
    Publicado 2022
    Libro electrónico
  20. 60
    por Pariser, Eli
    Publicado 2011
    Libro