Search Results for - Narrowed by: Springer E-Book Collection - Image processing. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Image$002bprocessing.$002509Image$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-19T10:33:35ZTransactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186822024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186312024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181562024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Campilho, Aurélio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:232932024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:247752024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Touchless Palmprint Recognition Systemsent://SD_ILS/0/SD_ILS:214972024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:213672024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:240842024-05-19T10:33:35Z2024-05-19T10:33:35ZYazar Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>