Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Triangle Mesh Watermarking and Steganography

Posted By: AvaxGenius
Triangle Mesh Watermarking and Steganography

Triangle Mesh Watermarking and Steganography by Hang Zhou , Kejiang Chen , Zehua Ma , Feng Wang , Weiming Zhang
English | PDF,EPUB | 2023 | 197 Pages | ISBN : 9811977194 | 23.9 MB

This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication.

Kryptografie und Steganografie mit Python

Posted By: IrGens
Kryptografie und Steganografie mit Python

Kryptografie und Steganografie mit Python
.MP4, AVC, 1280x720, 30 fps | Deutsch, AAC, 2 Ch | 2 Std. 18 min. | 858 MB
Trainer: Ralph Steyer

Optimization Models in Steganography Using Metaheuristics

Posted By: AvaxGenius
Optimization Models in Steganography Using Metaheuristics

Optimization Models in Steganography Using Metaheuristics by Dipti Kapoor Sarmah
English | EPUB | 2020 | 174 Pages | ISBN : 3030420434 | 25.7 MB

This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm. One of the most important types of media used for steganography is the JPEG image.

Modern Cryptography Applied Mathematics for Encryption and Information Security

Posted By: AvaxGenius
Modern Cryptography Applied Mathematics for Encryption and Information Security

Modern Cryptography Applied Mathematics for Encryption and Information Security by William Easttom
English | PDF | 2021 | 403 Pages | ISBN : 3030631141 | 9.3 MB

This textbook is a practical yet in depth guide to cryptography and its principles and practices. The book places cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications.

Reversible Steganography and Authentication via Transform Encoding (Studies in Computational Intelligence

Posted By: roxul
Reversible Steganography and Authentication via Transform Encoding (Studies in Computational Intelligence

Jyotsna Kumar Mandal, "Reversible Steganography and Authentication via Transform Encoding (Studies in Computational Intelligence "
English | ISBN: 9811543968 | 2020 | 342 pages | PDF | 13 MB