DocumentCode :
2111497
Title :
[Title page]
fYear :
2010
fDate :
17-19 Dec. 2010
Firstpage :
1
Lastpage :
8
Abstract :
The following topics are dealt with: computer technology; C# programming; data mining; disaster relief decision support system; embedded USB encryptor; threshold signcryption; slap fingerprint image; e-commerce authentication; source camera forensics; image compression; digital watermarking; information security; information processing; artificial intelligence; machine learning; handwritten character recognition; Web page information hiding; and elliptic curve cryptosystem.
Keywords :
computer forensics; cryptography; data compression; data mining; handwritten character recognition; image coding; image watermarking; learning (artificial intelligence); C# programming; Web page information hiding; artificial intelligence; communication system; computer technology; data mining; digital watermarking; disaster relief decision support system; e-commerce authentication; elliptic curve cryptosystem; embedded USB encryptor; handwritten character recognition; image compression; information processing; information security; information system; machine learning; network technology; network theory; signal processing; slap fingerprint image; source camera forensics; threshold signcryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
Type :
conf
DOI :
10.1109/ICITIS.2010.5689772
Filename :
5689772
Link To Document :
بازگشت