E3S Web Conf.
Volume 266, 2021Topical Issues of Rational Use of Natural Resources 2021
|Number of page(s)||9|
|Section||Information Telecommunication Technologies and Digital Transformation|
|Published online||04 June 2021|
- A.G. Konheim, Computer Security and Cryptography. (Hoboken, NJ: John Wiley and Sons, Inc, 2007). [Google Scholar]
- J. Ankit, Vector vs Raster Graphics, (2018) Jain Ankit, viewed 15 May 2020, https://www.geeksforgeeks.org/vector-vs-raster-graphics [Google Scholar]
- D. Hemmendinger Data Compression, Hemmendinger David, viewed 23 May 2020, https://www.britannica.com/technology/data-compression, (2000) [Google Scholar]
- T.A. Welche Technique for High-Performance Data Compression, viewed 21 May 2020, Sperry Research Center, (1984) [Google Scholar]
- P. Howard, True-Color GIF Example, viewed 21 May 2020, http://phil.ipal.org/tc.html, (2012) [Google Scholar]
- W. Bender, et al., Techniques for Data Hiding. Riverton. (NJ: IBM Systems Journal, 1996) [Google Scholar]
- M. de Haas, What are Color Models? Marten de Haas, viewed 19 May 2020, https://www.wigglepixel.nl/en/blog/what-are-color-models/ (2018) [Google Scholar]
Initial download of the metrics may take a while.