Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- steganalysis 5 Treffer
- data hiding 4 Treffer
- security 4 Treffer
- lsb 3 Treffer
- audio data hiding 2 Treffer
-
42 weitere Werte:
- cryptography 2 Treffer
- digital image 2 Treffer
- encryption 2 Treffer
- mp3 2 Treffer
- security analysis 2 Treffer
- stego image 2 Treffer
- aes algorithm 1 Treffer
- bemd 1 Treffer
- capacity 1 Treffer
- cloud computing 1 Treffer
- cover image 1 Treffer
- edge region 1 Treffer
- embedding 1 Treffer
- embedding capacity 1 Treffer
- extraction 1 Treffer
- financial statement 1 Treffer
- gaussian noise 1 Treffer
- glm 1 Treffer
- histogram shifting 1 Treffer
- ht 1 Treffer
- image quality 1 Treffer
- imf 1 Treffer
- information hiding 1 Treffer
- information security 1 Treffer
- integer wavelet transform 1 Treffer
- klt 1 Treffer
- least significant bit 1 Treffer
- lossless data hiding 1 Treffer
- multi-factor authentication 1 Treffer
- one-time password 1 Treffer
- psnr 1 Treffer
- randomization 1 Treffer
- salt and pepper noise 1 Treffer
- script 1 Treffer
- secret data delivery 1 Treffer
- secret sharing 1 Treffer
- secure 1 Treffer
- speckle noise 1 Treffer
- substitution 1 Treffer
- text 1 Treffer
- video streaming 1 Treffer
- watermarking 1 Treffer
Verlag
Publikation
Inhaltsanbieter
26 Treffer
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 9 (2016-12-31), Heft 12, S. 153-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 51-58academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 119-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 259-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 317-328academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 207-216academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 35-46academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 8 (2015-11-30), Heft 11, S. 265-272academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 67-94academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 8 (2015-07-30), Heft 7, S. 161-170academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 279-298academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 243-254academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 8 (2015-05-30), Heft 5, S. 259-266academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 163-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 69-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 405-414academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 7 (2014-10-30), Heft 5, S. 47-58academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 7 (2014-10-30), Heft 5, S. 123-132academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 183-194academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 7 (2014-06-30), Heft 3, S. 27-44academicJournalZugriff: