Home | Amazing | Today | Tags | Publishers | Years | Search 
The Essential Guide to Image Processing
The Essential Guide to Image Processing
THE Must-have introduction to image processing for both students and practitioners.

This comprehensive and state-of-the art approach to image processing gives engineers and students a comprehensive introduction, and includes full coverage of key applications: image watermarking, fingerprint recognition, face recognition and
...
Multimedia Image and Video Processing
Multimedia Image and Video Processing
Multimedia stands as one of the most challenging and exciting aspects of the information era. The extremely rapid growth of this field means that books even just a few years old may offer information that is already obsolete. Multimedia Image and Video Processing offers not only up-to-date research and developments, but does so in a way that...
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
The Photoshop Anthology: 101 Web Design Tips, Tricks & Techniques
The Photoshop Anthology: 101 Web Design Tips, Tricks & Techniques

The Photoshop Anthology is full-color, question-and-answer book for Web Designers who want to use Photoshop to build Websites and create better looking web graphics more effectively. The book covers:

  • Photoshop interface tricks & shortcuts
  • Basic Skills: Transparencies, rounded corners, blending images,...
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed...

Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island
Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island
This book constitutes the refereed post-proceedings of the 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, held in Jeju Island, Korea in October 2004.

The 74 revised full papers presented together with 2 invited keynote papers were carefully reviewed and selected from 170 submissions;...

Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China
Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Advances in Nonlinear Signal and Image Processing (EURASIP Book Series on Signal Processing and Communications)
Advances in Nonlinear Signal and Image Processing (EURASIP Book Series on Signal Processing and Communications)
The interest in nonlinear methods in signal processing is steadily increasing, since nowadays the advances in computational capacities make it possible to implement sophisticated nonlinear processing techniques which in turn allow remarkable improvements with respect to standard and well-consolidated linear processing approaches.

The aim of the...

Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy