Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches (English)
- New search for: Malik, Sana Ambreen
- New search for: Khan, Asifullah
- New search for: Hussain, Mutawarra
- New search for: Jawad, Khurram
- New search for: Chamlawi, Rafiullah
- New search for: Jalil, Abdul
- New search for: Malik, Sana Ambreen
- New search for: Khan, Asifullah
- New search for: Hussain, Mutawarra
- New search for: Jawad, Khurram
- New search for: Chamlawi, Rafiullah
- New search for: Jalil, Abdul
In:
Journal of Systems and Software
;
85
, 11
;
2665-2673
;
2012
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches
-
Contributors:Malik, Sana Ambreen ( author ) / Khan, Asifullah ( author ) / Hussain, Mutawarra ( author ) / Jawad, Khurram ( author ) / Chamlawi, Rafiullah ( author ) / Jalil, Abdul ( author )
-
Published in:Journal of Systems and Software ; 85, 11 ; 2665-2673
-
Publisher:
- New search for: Elsevier Inc.
-
Publication date:2012-06-06
-
Size:9 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 85, Issue 11
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2425
-
Strong fuzzy c-means in medical image data analysisKannan, S.R. / Ramathilagam, S. / Devi, R. / Hines, E. et al. | 2011
- 2439
-
Ontology driven bee's foraging approach based self adaptive online recommendation systemMohanraj, V. / Chandrasekaran, M. / Senthilkumar, J. / Arumugam, S. / Suresh, Y. et al. | 2011
- 2451
-
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256Liu, Ya / Gu, Dawu / Liu, Zhiqiang / Li, Wei et al. | 2012
- 2459
-
Cross-layer end-to-end label switching protocol for WiMAX–MPLS heterogeneous networksChen, Jenhui / Tarn, Woei-Hwa / Hsu, Wu-Hsiao / Wang, Chih-Chieh et al. | 2012
- 2470
-
A variable-length model for masquerade detectionXiao, Xi / Tian, Xinguang / Zhai, Qibin / Xia, Shutao et al. | 2012
- 2479
-
JCSI: A tool for checking secure information flow in Java Card applicationsAvvenuti, Marco / Bernardeschi, Cinzia / De Francesco, Nicoletta / Masci, Paolo et al. | 2012
- 2494
-
Interpretation problems related to the use of regression models to decide on economy of scale in software developmentJørgensen, Magne / Kitchenham, Barbara et al. | 2012
- 2504
-
From Teleo-Reactive specifications to architectural components: A model-driven approachSánchez, Pedro / Alonso, Diego / Morales, José Miguel / Navarro, Pedro Javier et al. | 2012
- 2519
-
Performance analysis of SCOOP programsMorandi, Benjamin / Nanz, Sebastian / Meyer, Bertrand et al. | 2012
- 2531
-
Grouping target paths for evolutionary generation of test data in parallelGong, Dunwei / Tian, Tian / Yao, Xiangjuan et al. | 2012
- 2541
-
Nearest neighbor selection for iteratively kNN imputationZhang, Shichao et al. | 2012
- 2553
-
An endurance solution for solid state drives with cacheWang, Wei-neng / Chen, Fu-sheng / Wang, Zhi-qiang et al. | 2012
- 2559
-
Percolation-based routing in the InternetPalmieri, Francesco et al. | 2012
- 2574
-
Software architecture evolution through evolvability analysisBreivold, Hongyu Pei / Crnkovic, Ivica / Larsson, Magnus et al. | 2012
- 2593
-
Optimizing virtual machines using hybrid virtualizationLin, Qian / Qi, Zhengwei / Wu, Jiewei / Dong, Yaozu / Guan, Haibing et al. | 2012
- 2604
-
Managing data dependencies in service compositionsMonsieur, Geert / Snoeck, Monique / Lemahieu, Wilfried et al. | 2012
- 2629
-
AIOLOS: Middleware for improving mobile application performance through cyber foragingVerbelen, Tim / Simoens, Pieter / De Turck, Filip / Dhoedt, Bart et al. | 2012
- 2640
-
Masquerade attacks based on user's profileRazo-Zapata, Iván S. / Mex-Perera, Carlos / Monroy, Raúl et al. | 2012
- 2652
-
Execution of natural language requirements using State Machines synthesised from Behavior TreesKim, Soon-Kyeong / Myers, Toby / Wendland, Marc-Florian / Lindsay, Peter A. et al. | 2012
- 2665
-
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approachesMalik, Sana Ambreen / Khan, Asifullah / Hussain, Mutawarra / Jawad, Khurram / Chamlawi, Rafiullah / Jalil, Abdul et al. | 2012
- CO2
-
Editorial Board| 2012