Search Results - Difference and Repetition

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2
  3. 3

    Intelligent Techniques in Signal Processing for Multimedia Security

    Published 2017
    Table of Contents: “…Security of Multimedia Contents: A Brief -- A Survey on Intelligent Security Techniques for High Definition Multimedia Data -- Intelligent Morphing and Steganography Techniques for Multimedia Security -- Information Hiding: Steganography -- Digital Watermarking: A Potential Solution For Multimedia Authentication -- Real Time Implementation of Reversible Watermarking -- Comparative Approach between Singular Value Decomposition and Randomized Singular Value Decomposition based watermarking -- Biometric Based Security System: Issues and Challenges -- Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network -- Hand Image based Personal Authentication System -- A Study on Security and Surveillance System using Gait Recognition -- Face Recognition under Dry and Wet Face Conditions -- Improved Approach for 3D Face Characterization -- Attendance Recording System using Partial Face Recognition Algorithm -- Automatic Human Emotion Recognition in Surveillance Video -- Watermarking in Bio-medical Signal Processing -- Pixel Repetition Technique: A high capacity and reversible data hiding method for e-healthcare applications -- A New method of Haar and Db10 based Secured Compressed Data Transmission over GSM Voice Channel -- StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection -- Adaptive Color Image Watermarking Scheme Using Weibull Distribution -- Multi-Fingerprint Unimodel based Biometric Authentication Supporting Cloud Computing.…”
    Full-text access
    View in OPAC
    e-Book
  4. 4
  5. 5
  6. 6
  7. 7

    Iterative Learning Control An Optimization Paradigm / by Owens, David H.

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  8. 8