Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- data hiding 4 Treffer
- steganalysis 3 Treffer
- audio data hiding 2 Treffer
- mp3 2 Treffer
- security 2 Treffer
-
26 weitere Werte:
- capacity 1 Treffer
- cloud computing 1 Treffer
- edge region 1 Treffer
- embedding 1 Treffer
- embedding capacity 1 Treffer
- extraction 1 Treffer
- gaussian noise 1 Treffer
- image quality 1 Treffer
- information security 1 Treffer
- integer wavelet transform 1 Treffer
- klt 1 Treffer
- least significant bit 1 Treffer
- multi-factor authentication 1 Treffer
- one-time password 1 Treffer
- randomization 1 Treffer
- salt and pepper noise 1 Treffer
- script 1 Treffer
- secret data delivery 1 Treffer
- secret sharing 1 Treffer
- secure 1 Treffer
- security analysis 1 Treffer
- speckle noise 1 Treffer
- stego image 1 Treffer
- substitution 1 Treffer
- text 1 Treffer
- video streaming 1 Treffer
Sprache
Inhaltsanbieter
18 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 51-58academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 119-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 259-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 317-328academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 207-216academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 35-46academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 67-94academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 279-298academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 243-254academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 163-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 69-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 405-414academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 183-194academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 285-294academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 387-398academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 431-436academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 4 (2010-11-30), Heft 4, S. 53-62academicJournalZugriff: