logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Optimization Models in Steganography Using Metaheuristics (Intelligent Systems Reference Library, 187) by Sarmah, Dipti Kapoor, Kulkarni, Anand J., Abraham, Ajith ISBN 9783030420437, 9783030420444, 3030420434, 3030420442

  • SKU: EBN-12083542
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

29 reviews
Instant download (eBook) Optimization Models in Steganography Using Metaheuristics (Intelligent Systems Reference Library, 187) after payment.
Authors:Sarmah, Dipti Kapoor, Kulkarni, Anand J., Abraham, Ajith
Pages:179 pages.
Year:2020
Editon:1st ed. 2020
Publisher:Springer
Language:english
File Size:4.32 MB
Format:pdf
ISBNS:9783030420437, 9783030420444, 3030420434, 3030420442
Categories: Ebooks

Product desciption

(Ebook) Optimization Models in Steganography Using Metaheuristics (Intelligent Systems Reference Library, 187) by Sarmah, Dipti Kapoor, Kulkarni, Anand J., Abraham, Ajith ISBN 9783030420437, 9783030420444, 3030420434, 3030420442

This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm. One of the most important types of media used for steganography is the JPEG image. Considering four important aspects of steganography techniques – picture quality, high data-hiding capacity, secret text security and computational time – the book provides extensive information on four novel image-based steganography approaches that employ JPEG compression. Academics, scientists and engineers engaged in research, development and application of steganography techniques, optimization and data analytics will find the book’s comprehensive coverage an invaluable resource.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products