Catálogo de publicaciones - libros
Intelligent Multimedia Data Hiding: New Directions
Jeng-Shyang Pan ; Hsiang-Cheh Huang ; Lakhmi C. Jain ; Wai-Chi Fang (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics); Biomedical Engineering; Health Informatics; Computer Applications
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-71168-1
ISBN electrónico
978-3-540-71169-8
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
Multipurpose Image Watermarking Algorithms and Applications
Zhe-Ming Lu; Hans Burkhardt; Shu-Chuan Chu
Let us now go back to the example in Chapter 3. In the last section of that chapter, we showed that the integral of a function, : ℝ → ℝ, over a surface parameterized by : ⊂ ℝ → ℝ is
Part IV - Practical Applications of Intelligent Multimedia Signal Processing and Data Hiding Systems | Pp. 287-323
Tabu Search Based Multi-Watermarking over Lossy Networks
Hsiang-Cheh Huang; Jeng-Shyang Pan; Chun-Yen Huang; Yu-Hsiu Huang; Kuang-Chih Huang
Let us now go back to the example in Chapter 3. In the last section of that chapter, we showed that the integral of a function, : ℝ → ℝ, over a surface parameterized by : ⊂ ℝ → ℝ is
Part IV - Practical Applications of Intelligent Multimedia Signal Processing and Data Hiding Systems | Pp. 325-355
Reversible Watermarking Techniques
Shao-Wei Weng; Yao Zhao; Jeng-Shyang Pan
Let us now go back to the example in Chapter 3. In the last section of that chapter, we showed that the integral of a function, : ℝ → ℝ, over a surface parameterized by : ⊂ ℝ → ℝ is
Part IV - Practical Applications of Intelligent Multimedia Signal Processing and Data Hiding Systems | Pp. 357-389