咨询与建议

限定检索结果

文献类型

  • 245 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 72 篇 软件工程
    • 39 篇 信息与通信工程
    • 28 篇 电气工程
    • 23 篇 测绘科学与技术
    • 12 篇 光学工程
    • 10 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 仪器科学与技术
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
  • 74 篇 理学
    • 46 篇 物理学
    • 25 篇 数学
    • 13 篇 生物学
    • 5 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 教育学
    • 3 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 81 篇 image coding
  • 45 篇 image compressio...
  • 20 篇 data compression
  • 20 篇 encryption
  • 20 篇 transform coding
  • 13 篇 image reconstruc...
  • 12 篇 image quality
  • 11 篇 psnr
  • 11 篇 watermarking
  • 10 篇 steganography
  • 10 篇 cryptography
  • 10 篇 video compressio...
  • 9 篇 streaming media
  • 9 篇 standards
  • 8 篇 discrete wavelet...
  • 8 篇 image processing
  • 8 篇 encoding
  • 7 篇 computational mo...
  • 7 篇 visualization
  • 7 篇 robustness

机构

  • 4 篇 national aviatio...
  • 4 篇 univ florida dep...
  • 3 篇 taras shevchenko...
  • 3 篇 state service fo...
  • 2 篇 institute of big...
  • 2 篇 general energy i...
  • 2 篇 kharkov national...
  • 2 篇 computational sc...
  • 2 篇 college of facul...
  • 2 篇 adv human design...
  • 2 篇 kwangwoon univ s...
  • 2 篇 administration o...
  • 2 篇 nmam institute o...
  • 2 篇 suny binghamton ...
  • 1 篇 ohio state univ ...
  • 1 篇 telkom univ sch ...
  • 1 篇 nitttr etv dept ...
  • 1 篇 larbi tebessi un...
  • 1 篇 information bran...
  • 1 篇 university of no...

作者

  • 6 篇 schmalz ms
  • 4 篇 preteux f.
  • 3 篇 ritter gx
  • 3 篇 mitrea m.
  • 3 篇 fowler ml
  • 2 篇 oleh suprun
  • 2 篇 bartolini f
  • 2 篇 kalienky d
  • 2 篇 oleksandr yudin
  • 2 篇 kim es
  • 2 篇 tice bradley s.
  • 2 篇 baronti s
  • 2 篇 alparone l
  • 2 篇 caimi fm
  • 2 篇 kim th
  • 2 篇 magli e
  • 2 篇 kundur d
  • 2 篇 olmo g
  • 2 篇 duta s.
  • 2 篇 holtz e

语言

  • 242 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=4th Conference on Mathematics of Image and Data Coding, Compression, and Encryption"
248 条 记 录,以下是1-10 订阅
排序:
Cryptographic image Security Using AES-XOR Approach  4
Cryptographic Image Security Using AES-XOR Approach
收藏 引用
4th International conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Santhosh, B. Kushmitha, V. Bhat, Samhita Mondal, Satyaki Joshitha, V. Dayananda Sagar College of Engineering Dept. of Electronics and Telecommunication Bangalore India
the primary objective of this project is to enhance the security of digital images transmitted over open networks by addressing privacy risks through cryptographic techniques. Recent image encryption methods, such as ... 详细信息
来源: 评论
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated encryption  4
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algo...
收藏 引用
4th IEEE International conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Siam, Abdullah Al Hassan, Md Maruf Bhuiyan, Touhid Daffodil International University Department of Software Engineering Dhaka Bangladesh Southeast University Department of CSE Bangladesh Washington University of Science and Technology School of IT VA United States
this study aims to develop a secure and effective framework for converting DICOM (Digital Imaging and Communications in Medicine) to JPEG 2000 to protect the integrity of medical images. the proposed approach uses Pyt... 详细信息
来源: 评论
Lightweight security Mechanism for IoT Applications using Substitution-Box  4
Lightweight security Mechanism for IoT Applications using Su...
收藏 引用
4th IEEE International conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Hanif, Fozia Shams, Rehan Waheed, Urooj University of Karachi Department of Mathematics Karachi Pakistan Sir Syed University of Engineering and Technology Karachi Department of Telecommunication Pakistan DHA Suffa University Karachi Department of Computer Science Pakistan
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. the devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to... 详细信息
来源: 评论
Enhancing the Compressed Video Quality through a Neural Network Approach  4
Enhancing the Compressed Video Quality through a Neural Netw...
收藏 引用
4th International conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Panneerselvam, Karthick Rajalakshmi, K. Sornalatha, P. Kpr Institute of Engineering and Technology Department of Computer Science & Engineering Tamil Nadu Uthupalayam641407 India Cmr Institute of Technology Department of Mca Karnataka Bengaluru560037 India Alagappa University Department of Computer Applications Tamil Nadu Karaikudi630003 India
Video compression mainly focuses on reducing the file size of videos with little loss of quality, but most video compression algorithms on the market do not focus on clarity. data compression is increasingly being con... 详细信息
来源: 评论
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated encryption
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algo...
收藏 引用
AI in Cybersecurity (ICAIC), International conference on
作者: Abdullah Al Siam Md Maruf Hassan Touhid Bhuiyan Department of Software Engineering Daffodil International University Dhaka Bangladesh Department of CSE Southeast University Bangladesh School of IT Washington University of Science and Technology VA USA
this study aims to develop a secure and effective framework for converting DICOM (Digital Imaging and Communications in Medicine) to JPEG 2000 to protect the integrity of medical images. the proposed approach uses Pyt... 详细信息
来源: 评论
image encryption ALGORIthM BASED ON WIDELY CHAOTIC 5D SYSTEMS AND DNA coding  25
IMAGE ENCRYPTION ALGORITHM BASED ON WIDELY CHAOTIC 5D SYSTEM...
收藏 引用
Proceedings of the 2025 4th International conference on Cryptography, Network Security and Communication Technology
作者: Puquan Cao Yanwei Zhu Luozhi Zhang College of Computer Science & Cyber Security Chengdu University of Technology Chengdu Sichuan China
Addressing the complexity of existing image encryption procedures, suboptimal computational performance, limited key space, and poor attack resistance. In this paper, a novel image encryption approach combining Arnold... 详细信息
来源: 评论
Cryptographic image Security Using AES-XOR Approach
Cryptographic Image Security Using AES-XOR Approach
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International conference on
作者: Santhosh B Kushmitha V Samhita Bhat Satyaki Mondal V Joshitha Dept. of Electronics and Telecommunication Dayananda Sagar College of Engineering Bangalore India
the primary objective of this project is to enhance the security of digital images transmitted over open networks by addressing privacy risks through cryptographic techniques. Recent image encryption methods, such as ... 详细信息
来源: 评论
EnigmaArt: Dual image encryption and compression via Autoencoding and Pixel Conversion  4th
EnigmaArt: Dual Image Encryption and Compression via Autoe...
收藏 引用
4th International conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2024
作者: Tiwari, Naveen Kumar Rajput, Shyam Singh Yadav, Aditya National Institute of Technology Patna Bihar Patna India Rajkiya Engineering College Kannauj UP Kannauj India
Securing sensitive visual data is essential in the digital age. Our research presents a sophisticated model of image encryption that combines RNA pixel conversion with an autoencoder. A convolutional ne... 详细信息
来源: 评论
Enhancing the Compressed Video Quality through a Neural Network Approach
Enhancing the Compressed Video Quality through a Neural Netw...
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International conference on
作者: Karthick Panneerselvam K. Rajalakshmi P. Sornalatha Department of Computer Science & Engineering KPR Institute of Engineering and Technology Uthupalayam Tamil Nadu India Department of MCA CMR Institute of Technology Bengaluru Karnataka India Department of Computer Applications Alagappa University Karaikudi Tamil Nadu India
Video compression mainly focuses on reducing the file size of videos with little loss of quality, but most video compression algorithms on the market do not focus on clarity. data compression is increasingly being con... 详细信息
来源: 评论
Lightweight security Mechanism for IoT Applications using Substitution-Box
Lightweight security Mechanism for IoT Applications using Su...
收藏 引用
AI in Cybersecurity (ICAIC), International conference on
作者: Fozia Hanif Rehan Shams Urooj Waheed Department of Mathematics University of Karachi Karachi Pakistan Department of Telecommunication Sir Syed University of Engineering and Technology Karachi Pakistan Department of Computer Science DHA Suffa University Karachi Pakistan
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. the devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to... 详细信息
来源: 评论