Implementing Image Steganography Using Least Significant Bit In Mobile Device


Download Implementing Image Steganography Using Least Significant Bit In Mobile Device PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Implementing Image Steganography Using Least Significant Bit In Mobile Device book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Implementing Image Steganography Using Least Significant Bit in Mobile Device


Implementing Image Steganography Using Least Significant Bit in Mobile Device

Author: Siti Dhalila Mohd Satar

language: en

Publisher:

Release Date: 2012


DOWNLOAD





Proceedings of International Conference on Computational Intelligence


Proceedings of International Conference on Computational Intelligence

Author: Ritu Tiwari

language: en

Publisher: Springer Nature

Release Date: 2023-07-12


DOWNLOAD





The book presents high quality research papers presented at International Conference on Computational Intelligence (ICCI 2022) held at Indian Institute of Information Technology Pune, India during 29 – 30 December, 2022. The topics covered are artificial intelligence, neural network, deep learning techniques, fuzzy theory and systems, rough sets, self-organizing maps, machine learning, chaotic systems, multi-agent systems, computational optimization ensemble classifiers, reinforcement learning, decision trees, support vector machines, hybrid learning, statistical learning, metaheuristics algorithms: evolutionary and swarm-based algorithms like genetic algorithms, genetic programming, differential evolution, particle swarm optimization, whale optimization, spider monkey optimization, firefly algorithm, memetic algorithms. And also machine vision, Internet of Things, image processing, image segmentation, data clustering, sentiment analysis, big data, computer networks, signal processing, supply chain management, web and text mining, distributed systems, bioinformatics, embedded systems, expert system, forecasting, pattern recognition, planning and scheduling, time series analysis, human-computer interaction, web mining, natural language processing, multimedia systems, and quantum computing.

Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014


Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014

Author: Suresh Chandra Satapathy

language: en

Publisher: Springer

Release Date: 2014-10-31


DOWNLOAD





This volume contains 87 papers presented at FICTA 2014: Third International Conference on Frontiers in Intelligent Computing: Theory and Applications. The conference was held during 14-15, November, 2014 at Bhubaneswar, Odisha, India. This volume contains papers mainly focused on Network and Information Security, Grid Computing and Clod Computing, Cyber Security and Digital Forensics, Computer Vision, Signal, Image & Video Processing, Software Engineering in Multidisciplinary Domains and Ad-hoc and Wireless Sensor Networks.