skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Optimization models in steganography using metaheuristics Preview this item
ClosePreview this item
Checking...

Optimization models in steganography using metaheuristics

Author: Dipti Kapoor Sarmah; Anand Jayant Kulkarni; Ajith Abraham
Publisher: Cham, Switzerland : Springer, [2020]
Series: Intelligent systems reference library, v. 187.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Sarmah, Dipti Kapoor
Optimization Models in Steganography Using Metaheuristics
Cham : Springer,c2020
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Dipti Kapoor Sarmah; Anand Jayant Kulkarni; Ajith Abraham
ISBN: 9783030420444 3030420442
OCLC Number: 1142528763
Notes: Description based upon print version of record.
Description: 1 online resource (174 p.).
Series Title: Intelligent systems reference library, v. 187.
Responsibility: Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1142528763<\/a>> # Optimization models in steganography using metaheuristics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1142528763<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Place\/cham_switzerland<\/a>> ; # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/mathematical_optimization<\/a>> ; # Mathematical optimization<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/metaheuristics<\/a>> ; # Metaheuristics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/abraham_ajith_1968<\/a>> ; # Ajith Abraham<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/kulkarni_anand_jayant<\/a>> ; # Anand Jayant Kulkarni<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/sarmah_dipti_kapoor<\/a>> ; # Dipti Kapoor Sarmah<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/9950699755<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/1868-4408<\/a>> ; # Intelligent systems reference library,<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Series\/intelligent_systems_reference_library<\/a>> ; # Intelligent systems reference library ;<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/9950699755#CreativeWork\/optimization_models_in_steganography_using_metaheuristics<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Optimization models in steganography using metaheuristics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1142528763<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1142528763#PublicationEvent\/cham_switzerland_springer_2020<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-030-42044-4<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.eblib.com\/choice\/PublicFullRecord.aspx?p=6121697<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783030420444<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1142528763<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/003.54\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Agent\/springer<\/a>> # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/abraham_ajith_1968<\/a>> # Ajith Abraham<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1968<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Abraham<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ajith<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ajith Abraham<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/kulkarni_anand_jayant<\/a>> # Anand Jayant Kulkarni<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Kulkarni<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Anand Jayant<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Anand Jayant Kulkarni<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Person\/sarmah_dipti_kapoor<\/a>> # Dipti Kapoor Sarmah<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Sarmah<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Dipti Kapoor<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Dipti Kapoor Sarmah<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Place\/cham_switzerland<\/a>> # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cham, Switzerland<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Series\/intelligent_systems_reference_library<\/a>> # Intelligent systems reference library ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1142528763<\/a>> ; # Optimization models in steganography using metaheuristics<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Intelligent systems reference library ;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/mathematical_optimization<\/a>> # Mathematical optimization<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mathematical optimization<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Topic\/metaheuristics<\/a>> # Metaheuristics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Metaheuristics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"sz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/public.eblib.com\/choice\/PublicFullRecord.aspx?p=6121697<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Click here to view book<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/9950699755#CreativeWork\/optimization_models_in_steganography_using_metaheuristics<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Optimization Models in Steganography Using Metaheuristics<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1142528763<\/a>> ; # Optimization models in steganography using metaheuristics<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783030420444<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3030420442<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783030420444<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/1868-4408<\/a>> # Intelligent systems reference library,<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1142528763<\/a>> ; # Optimization models in steganography using metaheuristics<\/span>\n\u00A0\u00A0\u00A0\nschema:issn<\/a> \"1868-4408<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Intelligent systems reference library,<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1142528763<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1142528763<\/a>> ; # Optimization models in steganography using metaheuristics<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-03-27<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1142528763#PublicationEvent\/cham_switzerland_springer_2020<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Place\/cham_switzerland<\/a>> ; # Cham, Switzerland<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9950699755#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n