咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是1-10 订阅
排序:
Enhancing Data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and compression Algortihm  3
Enhancing Data Security and Efficiency: A Hybrid Cryptograph...
收藏 引用
3rd International conference on Intelligent Data Communication technologies and Internet of Things, IDCIoT 2025
作者: Badhan, Akash Malhi, Simarjit Singh School of Computer Science and Engineering Lovely Professional University Phagwara India
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and ... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted image Based on Block and Huffman Encoding  2nd
Reversible Data Hiding in Encrypted Image Based on Block and...
收藏 引用
2nd International conference on Security and Information technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Yang, Cheng-Hsing Weng, Chi-Yao Huang, Bo-Han Huang, Wei-Qing Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung900 Taiwan Department of Computer Science and Information Engineering National Chiayi University Chiayi600 Taiwan
The paper presents a reversible data hiding method with image compression consisting of Huffman coding and block encrypted. In the proposed approach, the image is used to compressed for generating the specified space ... 详细信息
来源: 评论
Enhancing Data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and compression Algortihm
Enhancing Data Security and Efficiency: A Hybrid Cryptograph...
收藏 引用
Intelligent Data Communication technologies and Internet of Things (IDCIoT), International conference on
作者: Akash Badhan Simarjit Singh Malhi School of Computer Science and Engineering Lovely Professional University Phagwara India
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and ... 详细信息
来源: 评论
EnigmaArt: Dual image encryption and compression via Autoencoding and Pixel Conversion  4th
EnigmaArt: Dual Image Encryption and Compression via Autoe...
收藏 引用
4th International conference on Advanced Network technologies and Intelligent Computing, ANTIC 2024
作者: Tiwari, Naveen Kumar Rajput, Shyam Singh Yadav, Aditya National Institute of Technology Patna Bihar Patna India Rajkiya Engineering College Kannauj UP Kannauj India
Securing sensitive visual data is essential in the digital age. Our research presents a sophisticated model of image encryption that combines RNA pixel conversion with an autoencoder. A convolutional ne... 详细信息
来源: 评论
A Hybrid Approach Using Cryptography and K-Least Significant Bit Steganography Algorithm in Cloud Computing
A Hybrid Approach Using Cryptography and K-Least Significant...
收藏 引用
Advances in Computer Science, Electrical, Electronics, and Communication technologies (CE2CT), International conference on
作者: Anshika Goyal Bhumika Gupta Dept. of Computer Science & Engineering VMSB Uttarakhand Technical University Dehradun India Dept. of Computer Science & Engineering G.B. Pant Institute of Engineering & Technology Pauri India
The exponential growth of communication technologies has broadened the cloud computing ecosystem horizon to meet main communication needs. However, in-parallel upsurge in online attacks has alarmed industries to ensur... 详细信息
来源: 评论
image compression and encryption technologies
Image compression and encryption technologies
收藏 引用
image compression and encryption technologies
The proceedings contains 47 papers from the conference on image compression and encryption technologies. The topics discussed include: wavelet-based image compression and content authentication;near-lossless image com... 详细信息
来源: 评论
Partial encryption of Wavelet Compressed images
Partial Encryption of Wavelet Compressed Images
收藏 引用
International conference on Advanced Computer Science Applications and technologies (ACSAT)
作者: AbdulSalam, Ayad A. Univ Baghdad Coll Educ Women Baghdad Iraq
This work focuses its goal on the reduction in computational cost for image encryption. Bit selection for partial encryption is applied in this paper to show haw can match applications requirements without the overhea... 详细信息
来源: 评论
SCAN image compression encryption HARDWARE SYSTEM
SCAN IMAGE COMPRESSION ENCRYPTION HARDWARE SYSTEM
收藏 引用
conference on Digital Video compression - Algorithms and technologies 1995
作者: BOURBAKIS, NG BRAUSE, R ALEXOPOULOS, C SUNY BINGHAMTON DEPT EEAAAI LABBINGHAMTONNY 13902
This paper deals with the hardware design of an image compression/encryption scheme called SCAN. The scheme is based on the principles and ideas reflected by the specification of the SCAN language. SCAN is a fractal b... 详细信息
来源: 评论
encryption-then-compression techniques: A survey
Encryption-then-compression techniques: A survey
收藏 引用
2016 International conference on Control Instrumentation Communication and Computational technologies, ICCICCT 2016
作者: Shunmugan, S. Rani, P. Arockia Jansi Dept of Computer Science and Engineering Manonmaniam Sundaranar University Tirunelveli India
This paper presents the concept of image compression after encryption and study about the various technologies applied on encryption-then-compression technology. It is also analyses the various secured compression tec... 详细信息
来源: 评论
Applications of generalized computing in image compression coding
Applications of generalized computing in image compression c...
收藏 引用
conference on image compression and encryption technologies
作者: Yao, M Luo, JH Wu, M Zhejiang Univ Dept Comp Hangzhou 310027 Peoples R China
Data compression is one of key techniques in image processing, To begin with, this paper discusses the actuality of image compression coding, and then introduces generalized computing concept, Finally, by introducing ... 详细信息
来源: 评论