Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
41
-
42
-
43Publicado 2024Libro electrónico
-
44
-
45Publicado 2020“…The workshop focuses on information hiding topics, such as digital watermarking, steganography, steganalysis, anonymity, hard-to-intercept communications, and covert/subliminal channels. …”
Libro electrónico -
46Publicado 2012Libro
-
47
-
48
-
49Publicado 2017Tabla de Contenidos: “…Front Cover -- Lossless Information Hiding in Images -- Lossless InformationHiding in Images -- Copyright -- Contents -- Preface -- 1 - Introduction -- 1.1 BACKGROUND -- 1.1.1 DEFINITION OF IMAGES -- 1.1.1.1 Images -- 1.1.1.2 Digital Images -- 1.1.2 IMAGE PROCESSING AND IMAGE ANALYSIS -- 1.1.2.1 Image Processing in a Broad Sense -- 1.1.2.2 Image Processing in a Narrow Sense -- 1.1.2.2.1 Image Enhancement -- 1.1.2.2.2 Image Restoration -- 1.1.2.2.3 Image Compression -- 1.1.2.3 Image Analysis -- 1.1.3 NETWORK INFORMATION SECURITY -- 1.1.4 IMAGE PROTECTION AND IMAGE AUTHENTICATION -- 1.1.4.1 Image Protection -- 1.1.4.2 Image Authentication -- 1.2 OVERVIEW OF INFORMATION HIDING -- 1.2.1 BASIC CONCEPTS RELATED TO INFORMATION HIDING -- 1.2.2 PROPERTIES AND REQUIREMENTS OF INFORMATION HIDING -- 1.2.3 INFORMATION HIDING MODELS -- 1.2.3.1 Prisoner's Model -- 1.2.3.2 General Model -- 1.2.3.3 Communication-Based Models -- 1.2.4 RESEARCH BRANCHES OF INFORMATION HIDING -- 1.2.4.1 Steganography -- 1.2.4.2 Copyright Marking -- 1.2.4.3 Covert Channel -- 1.2.4.4 Subliminal Channel -- 1.2.4.5 Anonymous Communication -- 1.2.5 CLASSIFICATION OF INFORMATION HIDING TECHNOLOGIES -- 1.2.5.1 Classification According to the Types of Cover Objects -- 1.2.5.2 Classification According to the Symmetry of Keys -- 1.2.5.3 Classification According to the Embedding Domains -- 1.2.5.4 Classification Based on Other Ways -- 1.2.6 APPLICATIONS OF INFORMATION HIDING TECHNIQUES -- 1.2.6.1 Covert Communication -- 1.2.6.2 Broadcast Monitoring -- 1.2.6.3 Owner Identification -- 1.2.6.4 Ownership Verification -- 1.2.6.5 Transaction Tracking -- 1.2.6.6 Content Authentication -- 1.2.6.7 Annotation -- 1.2.6.8 Copy Control -- 1.2.6.9 Device Control -- 1.3 OVERVIEW OF IMAGE CODING AND COMPRESSION TECHNIQUES -- 1.3.1 SOURCE CODING AND DATA COMPRESSION -- 1.3.2 LOSSLESS IMAGE CODING TECHNIQUES…”
Libro electrónico -
50
-
51Publicado 2018Libro electrónico
-
52
-
53por Kite, MarionMaterias:
Publicado 2006Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
54por Stevenson, Robert Louis, 1850-1894
Publicado 1920Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
55
-
56por Wayner, Peter, 1964-“…Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …”
Publicado 2009
Libro electrónico -
57por Wayner, Peter, 1964-Tabla de Contenidos: “…Life in the Noise; Boy-Zs in Noizy, Idaho; 9.1 Hiding in the Noise; 9.2 Bit Twiddling; 9.3 Summary; Chapter 10. …”
Publicado 2002
Libro electrónico -
58
-
59Publicado 2022Libro electrónico
-
60