Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
https://canv.ai/
The picture is generated by canv.ai

We are excited to announce that Canv.ai now features a built-in translator, allowing you to communicate in your native language. You can write prompts in your language, and they will be automatically translated into English, facilitating communication and the exchange of ideas!

We value freedom of speech and guarantee the absence of censorship on Canv.ai. At the same time, we hope and believe in the high moral standards of our users, which will help maintain a respectful and constructive atmosphere.


👉 Check for yourself!

Multimedia Security Using Chaotic Maps: Principles and Methodologies (Repost)

Posted By: AvaxGenius
Multimedia Security Using Chaotic Maps: Principles and Methodologies (Repost)

Multimedia Security Using Chaotic Maps: Principles and Methodologies by Khalid M. Hosny
English | EPUB | 2020 | 271 Pages | ISBN : 3030386996 | 97.53 MB

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Information and Communications Security

Posted By: AvaxGenius
Information and Communications Security

Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II by Debin Gao
English | EPUB | 2021 | 429 Pages | ISBN : 3030880516 | 53.9 MB

This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021.

Transactions on Data Hiding and Multimedia Security III

Posted By: AvaxGenius
Transactions on Data Hiding and Multimedia Security III

Transactions on Data Hiding and Multimedia Security III by Yun Q. Shi
English | PDF | 2008 | 99 Pages | ISBN : 3540690166 | 2.2 MB

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.

Intelligent Techniques in Signal Processing for Multimedia Security (Repost)

Posted By: AvaxGenius
Intelligent Techniques in Signal Processing for Multimedia Security (Repost)

Intelligent Techniques in Signal Processing for Multimedia Security by Nilanjan Dey
English | PDF | 2017 | 483 Pages | ISBN : 3319447890 | 13.4 MB

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation.