000929098 000__ 01385cam\a2200397I\\4500 000929098 001__ 929098 000929098 005__ 20230306151334.0 000929098 006__ m\\\\\o\\d\\\\\\\\ 000929098 007__ cr\un\nnnunnun 000929098 008__ 200306s2020\\\\sz\\\\\\o\\\\\000\0\eng\d 000929098 020__ $$a9783030387006$$q(electronic book) 000929098 020__ $$a3030387003$$q(electronic book) 000929098 020__ $$z3030386996 000929098 020__ $$z9783030386993 000929098 035__ $$aSP(OCoLC)on1142936729 000929098 035__ $$aSP(OCoLC)1142936729 000929098 040__ $$aYDX$$beng$$cYDX$$dGW5XE 000929098 049__ $$aISEA 000929098 050_4 $$aQA76.575 000929098 08204 $$a006.7$$223 000929098 24500 $$aMultimedia security using chaotic maps :$$bprinciples and methodologies /$$cKhalid M. Hosny, editor. 000929098 260__ $$aCham :$$bSpringer,$$c2020. 000929098 300__ $$a1 online resource. 000929098 336__ $$atext$$btxt$$2rdacontent 000929098 337__ $$acomputer$$bc$$2rdamedia 000929098 338__ $$aonline resource$$bcr$$2rdacarrier 000929098 4901_ $$aStudies in computational intelligence ;$$vv. 884 000929098 506__ $$aAccess limited to authorized users. 000929098 650_0 $$aMultimedia systems$$xSecurity measures. 000929098 7001_ $$aHosny, Khalid M. 000929098 77608 $$iPrint version: $$z3030386996$$z9783030386993$$w(OCoLC)1130261453 000929098 830_0 $$aStudies in computational intelligence ;$$vv. 884. 000929098 852__ $$bebk 000929098 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-38700-6$$zOnline Access$$91397441.1 000929098 909CO $$ooai:library.usi.edu:929098$$pGLOBAL_SET 000929098 980__ $$aEBOOK 000929098 980__ $$aBIB 000929098 982__ $$aEbook 000929098 983__ $$aOnline 000929098 994__ $$a92$$bISE