找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Handbook of Multimedia Information Security: Techniques and Applications; Amit Kumar Singh,Anand Mohan Book 2019 Springer Nature Switzerla

[復(fù)制鏈接]
查看: 26388|回復(fù): 57
樓主
發(fā)表于 2025-3-21 16:10:56 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Handbook of Multimedia Information Security: Techniques and Applications
編輯Amit Kumar Singh,Anand Mohan
視頻videohttp://file.papertrans.cn/422/421694/421694.mp4
概述This Handbook covers the recent trends in multimedia in terms of security, processing and applications at the global level.Provides potential thoughts and methodology which is useful in creating new k
圖書封面Titlebook: Handbook of Multimedia Information Security: Techniques and Applications;  Amit Kumar Singh,Anand Mohan Book 2019 Springer Nature Switzerla
描述.This handbook is organized under three major parts. ?The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function...The second part. .of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing...The third part of this h
出版日期Book 2019
關(guān)鍵詞Multimedia; Security; Watermarking; Encryption; Biometrics; Soft computing; Big-data; transmission; cloud co
版次1
doihttps://doi.org/10.1007/978-3-030-15887-3
isbn_softcover978-3-030-15889-7
isbn_ebook978-3-030-15887-3
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

書目名稱Handbook of Multimedia Information Security: Techniques and Applications影響因子(影響力)




書目名稱Handbook of Multimedia Information Security: Techniques and Applications影響因子(影響力)學(xué)科排名




書目名稱Handbook of Multimedia Information Security: Techniques and Applications網(wǎng)絡(luò)公開度




書目名稱Handbook of Multimedia Information Security: Techniques and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Handbook of Multimedia Information Security: Techniques and Applications被引頻次




書目名稱Handbook of Multimedia Information Security: Techniques and Applications被引頻次學(xué)科排名




書目名稱Handbook of Multimedia Information Security: Techniques and Applications年度引用




書目名稱Handbook of Multimedia Information Security: Techniques and Applications年度引用學(xué)科排名




書目名稱Handbook of Multimedia Information Security: Techniques and Applications讀者反饋




書目名稱Handbook of Multimedia Information Security: Techniques and Applications讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:59:30 | 只看該作者
ektor*innen [An dieser Stelle m?chten wir uns herzlich bei Frau HR Dir. Mag. Isabella Zins und Herrn Dir. Mag. Dr. Michael Fleck für ihre wichtigen Einblicke und ihre freundliche Unterstützung bedanken.], die in Kooperation mit den Mitgliedern des ?sterreichischen Dachverbands der AHS-DirektorInnen
板凳
發(fā)表于 2025-3-22 00:49:00 | 只看該作者
地板
發(fā)表于 2025-3-22 06:47:01 | 只看該作者
5#
發(fā)表于 2025-3-22 10:53:54 | 只看該作者
6#
發(fā)表于 2025-3-22 16:29:41 | 只看該作者
7#
發(fā)表于 2025-3-22 19:09:42 | 只看該作者
8#
發(fā)表于 2025-3-22 21:22:00 | 只看該作者
Hybrid Transforms Based Oblivious Fragile Watermarking Techniques further processed by an extraction algorithm to extract the watermark when required. To check the features such as robustness, fragility etc. attacks are executed on the watermarked image and then the watermark is extracted from it.
9#
發(fā)表于 2025-3-23 04:46:20 | 只看該作者
10#
發(fā)表于 2025-3-23 07:21:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 00:00
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
赤城县| 犍为县| 周口市| 金平| 五大连池市| 潢川县| 剑河县| 清涧县| 荥经县| 达孜县| 宁南县| 姜堰市| 中西区| 石台县| 富裕县| 嘉义市| 甘南县| 三门峡市| 阳原县| 南丰县| 永善县| 和龙市| 双江| 潜山县| 涪陵区| 房产| 右玉县| 内乡县| 巫溪县| 德保县| 宜州市| 长沙县| 仪陇县| 揭阳市| 蒲江县| 全州县| 克山县| 深州市| 留坝县| 璧山县| 阳高县|