Explore our comprehensive collection of books, articles, digital media, and more
Developing a robust digital image watermark by using frequency and spatial domains \
Digital image processing /
Image encryption based on chaos technique \
Arabic Image Caption Generator Using Deep Learning Techniques /
Digital image processing algorithms and applications /
Digital image processing and analysis : human and computer vision applications with CVIPtools /
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \
Image Processing Applications Using Matlab /
Digital imaging : a practical handbook /
Image processing : the fundamentals /
Selection of the appropriate cover to hide information in images \
Improving cross-domain using Current Certificate Status Protocol (CCSP) /
Color image segmentation based on region growing algorithm \
Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide /
Digital signal processing /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Understanding cryptography : a textbook for students and practitioners /
Cryptography : theory and practice /
Ibn ad-Durayhim's treatise on cryptanalysis.
A classical introduction to cryptography : applications for communications security /
Coding theory and cryptography : the essentials /
Series on Arabic origins of cryptology /
Advances in coding theory and crytography/
Elliptic curves : number theory and cryptography /
Introduction to modern cryptography /
Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007 : proceedings /