咨询与建议

限定检索结果

文献类型

  • 246 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 249 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 72 篇 软件工程
    • 40 篇 信息与通信工程
    • 28 篇 电气工程
    • 23 篇 测绘科学与技术
    • 12 篇 光学工程
    • 10 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 仪器科学与技术
    • 7 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
  • 74 篇 理学
    • 46 篇 物理学
    • 25 篇 数学
    • 13 篇 生物学
    • 5 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 教育学
    • 3 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 82 篇 image coding
  • 45 篇 image compressio...
  • 20 篇 data compression
  • 20 篇 encryption
  • 20 篇 transform coding
  • 13 篇 image reconstruc...
  • 13 篇 image quality
  • 11 篇 psnr
  • 11 篇 watermarking
  • 10 篇 steganography
  • 10 篇 cryptography
  • 10 篇 video compressio...
  • 9 篇 streaming media
  • 9 篇 standards
  • 8 篇 discrete wavelet...
  • 8 篇 computational mo...
  • 8 篇 image processing
  • 8 篇 encoding
  • 7 篇 visualization
  • 7 篇 robustness

机构

  • 4 篇 national aviatio...
  • 4 篇 univ florida dep...
  • 3 篇 taras shevchenko...
  • 3 篇 state service fo...
  • 2 篇 institute of big...
  • 2 篇 general energy i...
  • 2 篇 kharkov national...
  • 2 篇 computational sc...
  • 2 篇 college of facul...
  • 2 篇 adv human design...
  • 2 篇 kwangwoon univ s...
  • 2 篇 administration o...
  • 2 篇 nmam institute o...
  • 2 篇 suny binghamton ...
  • 1 篇 ohio state univ ...
  • 1 篇 telkom univ sch ...
  • 1 篇 nitttr etv dept ...
  • 1 篇 larbi tebessi un...
  • 1 篇 information bran...
  • 1 篇 university of no...

作者

  • 6 篇 schmalz ms
  • 4 篇 preteux f.
  • 3 篇 ritter gx
  • 3 篇 mitrea m.
  • 3 篇 fowler ml
  • 2 篇 oleh suprun
  • 2 篇 bartolini f
  • 2 篇 kalienky d
  • 2 篇 oleksandr yudin
  • 2 篇 kim es
  • 2 篇 tice bradley s.
  • 2 篇 baronti s
  • 2 篇 alparone l
  • 2 篇 caimi fm
  • 2 篇 kim th
  • 2 篇 magli e
  • 2 篇 kundur d
  • 2 篇 olmo g
  • 2 篇 duta s.
  • 2 篇 holtz e

语言

  • 243 篇 英文
  • 6 篇 其他
检索条件"任意字段=4th Conference on Mathematics of Image and Data Coding, Compression, and Encryption"
249 条 记 录,以下是1-10 订阅
排序:
EnigmaArt: Dual image encryption and compression via Autoencoding and Pixel Conversion  4th
EnigmaArt: Dual Image Encryption and Compression via Autoenc...
收藏 引用
4th International conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Tiwari, Naveen Kumar Rajput, Shyam Singh Yadav, Aditya Natl Inst Technol Patna Patna Bihar India Rajkiya Engn Coll Kannauj Kannauj UP India
Securing sensitive visual data is essential in the digital age. Our research presents a sophisticated model of image encryption that combines RNA pixel conversion with an autoencoder. A convolutional neural network (C... 详细信息
来源: 评论
Cryptographic image Security Using AES-XOR Approach  4
Cryptographic Image Security Using AES-XOR Approach
收藏 引用
4th International conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Santhosh, B. Kushmitha, V. Bhat, Samhita Mondal, Satyaki Joshitha, V. Dayananda Sagar College of Engineering Dept. of Electronics and Telecommunication Bangalore India
the primary objective of this project is to enhance the security of digital images transmitted over open networks by addressing privacy risks through cryptographic techniques. Recent image encryption methods, such as ... 详细信息
来源: 评论
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algorithm with Integrated encryption  4
Secure Medical Imaging: A DICOM to JPEG 2000 Conversion Algo...
收藏 引用
4th IEEE International conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Siam, Abdullah Al Hassan, Md Maruf Bhuiyan, Touhid Daffodil International University Department of Software Engineering Dhaka Bangladesh Southeast University Department of CSE Bangladesh Washington University of Science and Technology School of IT VA United States
this study aims to develop a secure and effective framework for converting DICOM (Digital Imaging and Communications in Medicine) to JPEG 2000 to protect the integrity of medical images. the proposed approach uses Pyt... 详细信息
来源: 评论
Dictionary-Based BPT compression with Trimodal encryption for Efficient Fiber-Optic data Management and Security  4th
Dictionary-Based BPT Compression with Trimodal Encryption fo...
收藏 引用
4th International conference on Smart Systems: Innovations in Computing, SSIC 2023
作者: Alapatt, Bosco Paul Poonia, Ramesh Chandra Singh, Chandraketu Delhi NCR India
Fiber-optic transmission systems are capable of carrying tens of terabits per second of traffic and thereby form the core infrastructure for all Internet-based services and applications. While fiber-optic communicatio... 详细信息
来源: 评论
Lightweight security Mechanism for IoT Applications using Substitution-Box  4
Lightweight security Mechanism for IoT Applications using Su...
收藏 引用
4th IEEE International conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Hanif, Fozia Shams, Rehan Waheed, Urooj University of Karachi Department of Mathematics Karachi Pakistan Sir Syed University of Engineering and Technology Karachi Department of Telecommunication Pakistan DHA Suffa University Karachi Department of Computer Science Pakistan
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. the devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to... 详细信息
来源: 评论
Enhancing the Compressed Video Quality through a Neural Network Approach  4
Enhancing the Compressed Video Quality through a Neural Netw...
收藏 引用
4th International conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Panneerselvam, Karthick Rajalakshmi, K. Sornalatha, P. Kpr Institute of Engineering and Technology Department of Computer Science & Engineering Tamil Nadu Uthupalayam641407 India Cmr Institute of Technology Department of Mca Karnataka Bengaluru560037 India Alagappa University Department of Computer Applications Tamil Nadu Karaikudi630003 India
Video compression mainly focuses on reducing the file size of videos with little loss of quality, but most video compression algorithms on the market do not focus on clarity. data compression is increasingly being con... 详细信息
来源: 评论
Chaotic image encryption method based on Zigzag scrambling and DNA coding  4
Chaotic image encryption method based on Zigzag scrambling a...
收藏 引用
4th International conference on Frontiers Technology of Information and Computer, ICFTIC 2022
作者: Liu, Zhen Zhu, Donglin Zhou, Changjun Zhang, Wenyu College of Mathematics and Computer Science of Zhejiang Normal University Zhejiang province Jinhua China College of Faculty of Information Science and Engineering Ocean University of China Shandong province Qingdao China
In the process of using the network, data security needs to be considered. image, as an important part of data, also needs to be considered. image encryption play an important role in protecting users' confidentia... 详细信息
来源: 评论
image compression scheme based on region of interest recognition  4
Image compression scheme based on region of interest recogni...
收藏 引用
4th International conference on Electronic Communication, Computer Science and Technology, ECCST 2024
作者: Wu, Dawei Bai, Enjian College of Information Science and Technology Donghua University Shanghai201620 China
With the development of networks, many fields now demand higher quality in specific image areas, such as main characters in photos, lesion areas in medical images, and features in remote sensing. At the same time, the... 详细信息
来源: 评论
Improving image compression Performance by Spatial-Channel Context Adaptive Model  4
Improving Image Compression Performance by Spatial-Channel C...
收藏 引用
4th International conference on Electronic Communication and Artificial Intelligence, ICECAI 2023
作者: Wang, Hao Wang, Huifen Xue, Junda Lu, Enmin Wang, Hanming Wu, Zijun Song, Yunlong Institute of Big Data and Artificial Intelligence China Telecom Corporation Limited Beijing Research Institute Beijing China
the significance of enhancing image compression efficiency for machine vision, analysis, and comprehension tasks has gained increasing recognition. In response to this need, we propose and implement a novel method cal... 详细信息
来源: 评论
Color image encryption Using Genetic Recombination With Tent Mapping Based Time-Delay Chaotic  4
Color Image Encryption Using Genetic Recombination With Tent...
收藏 引用
4th International conference on Computer Graphics, image, and Virtualization, ICCGIV 2024
作者: Xu, Yaoqun Liu, Jiaoyang Institute of System Engineering Harbin University of Commerce Harbin150028 China School of Computer and Information Engineering Harbin University of Commerce Harbin150028 China
As the form of information transmission has shifted from text to images in recent years, the in-crease in information dimension has led to a growing interest in secure and efficient encryption algorithms. this paper p... 详细信息
来源: 评论