You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the worlds communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.
None
Explore the power of machine learning to revolutionize signal processing and optimization with cutting-edge techniques and practical insights in this outstanding new volume from Scrivener Publishing. Modeling and Optimization of Signals using Machine Learning Techniques is designed for researchers from academia, industries, and R&D organizations worldwide who are passionate about advancing machine learning methods, signal processing theory, data mining, artificial intelligence, and optimization. This book addresses the role of machine learning in transforming vast signal databases from sensor networks, internet services, and communication systems into actionable decision systems. It explores...
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses all current issues associated with computing, communication and information. The proceedings consists of invited papers dealing with the review of performance models of computer and communication systems and contributed papers that feature topics such as networking, cloud computing, fuzzy logic, mobile communication, image processing, navigation systems, biometrics and Web services covering literally all the vital areas of the computing domains.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses issues associated with computing, communication and information. Its aim is to increase exponentially the participants' awareness of the current and future direction in the domains and to create a platform between researchers, leading industry developers and end users to interrelate.
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing.
These volumes constitute the Proceedings of the 6th International Workshop on Soft Computing Applications, or SOFA 2014, held on 24-26 July 2014 in Timisoara, Romania. This edition was organized by the University of Belgrade, Serbia in conjunction with Romanian Society of Control Engineering and Technical Informatics (SRAIT) - Arad Section, The General Association of Engineers in Romania - Arad Section, Institute of Computer Science, Iasi Branch of the Romanian Academy and IEEE Romanian Section. The Soft Computing concept was introduced by Lotfi Zadeh in 1991 and serves to highlight the emergence of computing methodologies in which the accent is on exploiting the tolerance for imprecision an...
The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of stegano...