top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent Systems and Applications - Volume 2 [[electronic resource] ] : Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 / / edited by Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin
Advances in Intelligent Systems and Applications - Volume 2 [[electronic resource] ] : Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 / / edited by Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (802 p.)
Disciplina 006.3
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 1-283-94583-5
3-642-35473-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.
Record Nr. UNINA-9910437897603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNINA-9910483252903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNISA-996198536403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security with Intelligent Computing and Big-data Services [[electronic resource] ] : Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) / / edited by Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
Security with Intelligent Computing and Big-data Services [[electronic resource] ] : Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) / / edited by Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (933 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-16946-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484753903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910464706103321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Classificazione COM083000MAT003000TEC015000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910789483503321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Classificazione COM083000MAT003000TEC015000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910813853303321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui