咨询与建议

限定检索结果

文献类型

  • 246 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 249 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 72 篇 软件工程
    • 39 篇 信息与通信工程
    • 28 篇 电气工程
    • 23 篇 测绘科学与技术
    • 12 篇 光学工程
    • 10 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 仪器科学与技术
    • 7 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
  • 74 篇 理学
    • 46 篇 物理学
    • 25 篇 数学
    • 13 篇 生物学
    • 5 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
  • 57 篇 医学
    • 56 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 教育学
    • 3 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 82 篇 image coding
  • 45 篇 image compressio...
  • 20 篇 data compression
  • 20 篇 encryption
  • 20 篇 transform coding
  • 13 篇 image reconstruc...
  • 13 篇 image quality
  • 11 篇 psnr
  • 11 篇 watermarking
  • 10 篇 steganography
  • 10 篇 cryptography
  • 10 篇 video compressio...
  • 9 篇 streaming media
  • 9 篇 standards
  • 8 篇 discrete wavelet...
  • 8 篇 computational mo...
  • 8 篇 image processing
  • 8 篇 encoding
  • 7 篇 visualization
  • 7 篇 robustness

机构

  • 4 篇 national aviatio...
  • 4 篇 univ florida dep...
  • 3 篇 taras shevchenko...
  • 3 篇 state service fo...
  • 2 篇 institute of big...
  • 2 篇 general energy i...
  • 2 篇 kharkov national...
  • 2 篇 computational sc...
  • 2 篇 college of facul...
  • 2 篇 adv human design...
  • 2 篇 kwangwoon univ s...
  • 2 篇 administration o...
  • 2 篇 nmam institute o...
  • 2 篇 suny binghamton ...
  • 1 篇 ohio state univ ...
  • 1 篇 telkom univ sch ...
  • 1 篇 nitttr etv dept ...
  • 1 篇 larbi tebessi un...
  • 1 篇 information bran...
  • 1 篇 university of no...

作者

  • 6 篇 schmalz ms
  • 4 篇 preteux f.
  • 3 篇 ritter gx
  • 3 篇 mitrea m.
  • 3 篇 fowler ml
  • 2 篇 oleh suprun
  • 2 篇 bartolini f
  • 2 篇 kalienky d
  • 2 篇 oleksandr yudin
  • 2 篇 kim es
  • 2 篇 tice bradley s.
  • 2 篇 baronti s
  • 2 篇 alparone l
  • 2 篇 caimi fm
  • 2 篇 kim th
  • 2 篇 magli e
  • 2 篇 kundur d
  • 2 篇 olmo g
  • 2 篇 duta s.
  • 2 篇 holtz e

语言

  • 243 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=4th Conference on Mathematics of Image and Data Coding, Compression, and Encryption"
249 条 记 录,以下是141-150 订阅
排序:
3-Level Security Based Spread Spectrum image Steganography with Enhanced Peak Signal to Noise Ratio  4
3-Level Security Based Spread Spectrum Image Steganography w...
收藏 引用
4th International conference on image Information Processing (ICIIP)
作者: Yadav, Poonam Dutta, Maitreyee NITTTR Dept Elect & Commun Engn Chandigarh India NITTTR ETV Dept Chandigarh India
this research elucidate a method of enhancing peak signal to noise ratio and minimizing mean square error through spread spectrum image steganography. the center of focus is more onto security, for that three levels o... 详细信息
来源: 评论
image compression scheme based on region of interest recognition  4
Image compression scheme based on region of interest recogni...
收藏 引用
4th International conference on Electronic Communication, Computer Science and Technology, ECCST 2024
作者: Wu, Dawei Bai, Enjian College of Information Science and Technology Donghua University Shanghai201620 China
With the development of networks, many fields now demand higher quality in specific image areas, such as main characters in photos, lesion areas in medical images, and features in remote sensing. At the same time, the... 详细信息
来源: 评论
A high payload data hiding scheme for color image based on BTC compression technique
A high payload data hiding scheme for color image based on B...
收藏 引用
International conference on Genetic and Evolutionary Computing
作者: Chou, Yung-Chen Chang, Hon-Hang Department of Computer Science and Information Engineering Asia University Taichung 41354 Taiwan Department of Photonics and Communication Engineering Asia University Taichung 41354 Taiwan
In the daily life, secret data delivery is an important application for private communication among parties over computer networks. data embedding technique is a good way to achieve the secret data delivery. A color i... 详细信息
来源: 评论
ICIIS 2009 - 4th International conference on Industrial and Information Systems 2009, conference Proceedings
ICIIS 2009 - 4th International Conference on Industrial and ...
收藏 引用
4th International conference on Industrial and Information Systems 2009, ICIIS 2009
the proceedings contain 110 papers. the topics discussed include: an end to end correctness verification approach for application specific usage control;a novel and efficient cryptosystem for long message encryption;h...
来源: 评论
Implementation of SPIHT and WDR algorithms for natural and artificial images using wavelets
Implementation of SPIHT and WDR algorithms for natural and a...
收藏 引用
4th International conference on Computational Intelligence and Communication Networks, CICN 2012
作者: Singh, Priyanka Singh, Priti India
the objective of this paper is to implement SPIHT and WDR image coder. We have used here two different images Natural and Artificial. Artificial image stand for image on which enhancement techniques have been applied ... 详细信息
来源: 评论
Reversible data hiding in images: a brief survey  4
Reversible data hiding in images: a brief survey
收藏 引用
4th International conference on Advances in Computer Technology, Information Science and Communications, CTISC 2022
作者: Di, Fuqiang Kong, Yongjun Yang, Pan Wang, Zexi Ge, Yu Li, Min Engineering University of Pap Xi'an China Engineering University of Rf Xi'an China
Reversible data hiding technology is an important branch of information hiding technology, and has become an important means to solve problems in information security and privacy protection. With the increasing demand... 详细信息
来源: 评论
A simple image encoding method with data lossless information hiding  10
A simple image encoding method with data lossless informatio...
收藏 引用
4th International conference on Uniquitous Information Management and Communication, ICUIMC'10
作者: Wang, Zhi-Hui Chang, Chin-Chen Li, Ming-Chu Lu, Tzu-Chuen School of Software Dalian University of Technology Liaoning China Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan Department of Information Management Chaoyang University of Technology Taichung Taiwan
In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. the BTC method compresses a block of a grayscale image to a bitmap ... 详细信息
来源: 评论
A Chaotic Searchable image encryption Scheme Integrating with Block Truncation coding  4th
A Chaotic Searchable Image Encryption Scheme Integrating wit...
收藏 引用
4th International conference on Cloud Computing and Security (ICCCS)
作者: Jiang, Mingfang Sun, Guang Hunan First Normal Univ Dept Informat Sci & Engn Changsha 410205 Hunan Peoples R China Hunan Univ Finance & Econ Res Inst Finance & Econ Big Data Changsha 410073 Hunan Peoples R China
In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable image encryption algorithm based on Block Truncation coding (BTC) and Henon chaotic map is presented. Henon ... 详细信息
来源: 评论
ECC based biometric encryption of compressed image for security over network channels
ECC based biometric encryption of compressed image for secur...
收藏 引用
4th International conference on Signal and image Processing 2012, ICSIP 2012
作者: Prasanalakshmi, B. Kannammal, A. Department of CSE Thirumalai Engineering College Kanchipuram India Coimbatore Institute of Technology Coimbatore India
this paper provides a way for secure transmission of data over networks. the security is initialized by means of using biometric data as private key, imposing the biometric data compression using 5- level Discrete wav... 详细信息
来源: 评论
Number-Based Strings/Passwords from Imaginary Graphs of Topological coding for encryption  4
Number-Based Strings/Passwords from Imaginary Graphs of Topo...
收藏 引用
4th IEEE Advanced Information Management, Communicates, Electronic and Automation Control conference, IMCEC 2021
作者: Wang, Hongyu Yao, Bing Su, Jing Zhang, Wanjia National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100029 China College of Mathematics and Statistics Northwest Normal University Lanzhou730070 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100029 China Hotan Teachers College Xinjiang Uygur Autonomous Region848000 China
For letting graphic lattices approaching lattices, we define imaginary graphs and the leaf-splitting operation and the leaf-coinciding operation, and show an equivalent property: the leaf-splitting connectivity of a c... 详细信息
来源: 评论