Open Access
E3S Web Conf.
Volume 266, 2021
Topical Issues of Rational Use of Natural Resources 2021
Article Number 09006
Number of page(s) 9
Section Information Telecommunication Technologies and Digital Transformation
Published online 04 June 2021
  1. A.G. Konheim, Computer Security and Cryptography. (Hoboken, NJ: John Wiley and Sons, Inc, 2007). [Google Scholar]
  2. J. Ankit, Vector vs Raster Graphics, (2018) Jain Ankit, viewed 15 May 2020, [Google Scholar]
  3. D. Hemmendinger Data Compression, Hemmendinger David, viewed 23 May 2020,, (2000) [Google Scholar]
  4. T.A. Welche Technique for High-Performance Data Compression, viewed 21 May 2020, Sperry Research Center, (1984) [Google Scholar]
  5. P. Howard, True-Color GIF Example, viewed 21 May 2020,, (2012) [Google Scholar]
  6. W. Bender, et al., Techniques for Data Hiding. Riverton. (NJ: IBM Systems Journal, 1996) [Google Scholar]
  7. M. de Haas, What are Color Models? Marten de Haas, viewed 19 May 2020, (2018) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.