咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是91-100 订阅
排序:
SecretPixel: Advanced Steganography with Seeded Random Embedding and AES-RSA encryption
SecretPixel: Advanced Steganography with Seeded Random Embed...
收藏 引用
2024 IEEE International conference on Intelligent Signal Processing and Effective Communication technologies, INSPECT 2024
作者: Barnwal, Aditya Sah, Aryman Rajkumar, S. Khera, Naman Umesh Srivastav, Rohan Sivasankar, Achyuthan Vellore Institure of Technology SCOPE Vellore India
This paper presents SecretPixel, a steganographic tool that integrates random embedding techniques and advanced encryption to securely hide data within images. SecretPixel ensures confidentiality and integrity of the ... 详细信息
来源: 评论
A fractal-coding-like lossless binary image compressing method
A fractal-coding-like lossless binary image compressing meth...
收藏 引用
conference on image compression and encryption technologies
作者: Zhang, TX Tong, XF Zuo, Z Li, Y Huazhong Univ Sci & Technol State Key Lab Image Proc & Intelligent Control Inst Pattern Recognit & Artificial Intelligence Wuhan 430074 Peoples R China
A new binary image lossless compressing method is proposed, which regards a binary image as being constructed of a limited number of fractal elements that have undergone a series of operations such as contraction/dila... 详细信息
来源: 评论
An image coding algorithm using a new VQ distortion measure
An image coding algorithm using a new VQ distortion measure
收藏 引用
conference on image compression and encryption technologies
作者: Jiang, SD Wang, Q Sun, SH Harbin Inst Technol Dept Automat Test & Control Harbin 150001 Peoples R China
As an efficient technique for data compression, vector quantization (VQ) has been successfully used for various applications involving VQ-based encoding and VQ-based recognition. The response time of encoding and reco... 详细信息
来源: 评论
Robust image Obfuscation for Privacy Protection in Web 2.0 Applications
Robust Image Obfuscation for Privacy Protection in Web 2.0 A...
收藏 引用
conference on Media Watermarking, Security, and Forensics
作者: Poller, Andreas Steinebach, Martin Liu, Huajian Fraunhofer Inst Secure Informat Technol Darmstadt Germany
We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in W... 详细信息
来源: 评论
Enhancing image Security Using Data compression and Spread Spectrum Watermarking Technique  7
Enhancing Image Security Using Data Compression and Spread S...
收藏 引用
7th International conference on Communication Systems and Network technologies (CSNT)
作者: Saxena, Priyanka Shahane, Dipesh Rai, Sandeep Boghey, Rajesh Technocrats Inst Technol Excellence Comp Sci & Engn Bhopal India
To protect multimedia information system like audio, video, text and image, digital watermarking could be a legendary technique that hides or cover one type of information into a different or same type of information ... 详细信息
来源: 评论
Coding and transmission of subband coded images in the Internet
Coding and transmission of subband coded images in the Inter...
收藏 引用
conference on image compression and encryption technologies
作者: Wah, BW Su, X Univ Illinois Dept Elect & Comp Engn Urbana IL 61801 USA
Subband-coded images can be transmitted in the Internet using either the TCP or the UDP protocol. Delivery by TCP gives superior decoding quality but with very long delays when the network is unreliable, whereas deliv... 详细信息
来源: 评论
A Robust Medical image Watermarking Approach Based on K-Level Clustering and Asymmetric encryption  1
A Robust Medical Image Watermarking Approach Based on K-Leve...
收藏 引用
1st International conference on Innovative and Intelligent Information technologies, IC3IT 2024
作者: Kahla, Mohammed Elhabib Beggas, Mounir Laouid, Abdelkader Bounceur, Ahcene Kara, Mostefa University of El Oued Liap Laboratory Computer Science Department El Oued Algeria University of Sharjah Information & Computer Science Department Sharjah United Arab Emirates Dhahran31261 Saudi Arabia
The increasing use of digital medical images in healthcare has raised significant concerns regarding their security, privacy, and integrity during transmission and storage. Unauthorized access, tampering, and image ma... 详细信息
来源: 评论
APPLIED SEQUENTIAL-SEARCH ALGORITHM FOR compression-encryption OF HIGH-RESOLUTION STRUCTURED LIGHT 3D DATA
APPLIED SEQUENTIAL-SEARCH ALGORITHM FOR COMPRESSION-ENCRYPTI...
收藏 引用
International conference on Interfaces and Human Computer Interaction / International conference on Game and Entertainment technologies / International conference on Computer Graphics, Visualization, Computer Vision and image Processing
作者: Siddeq, Mohammed M. Rodrigues, Marcos A. Sheffield Hallam Univ GMPR Geometr Modelling & Pattern Recognit Res Grp Sheffield S Yorkshire England
Anew image compression algorithm is proposed and demonstrated in the context of structured light 3D reconstruction. Structured light images contain patterns of light, which are captured by the sensor at very high reso... 详细信息
来源: 评论
A novel multi-chaos based compressive sensing encryption technique
A novel multi-chaos based compressive sensing encryption tec...
收藏 引用
2019 International conference on Advances in the Emerging Computing technologies, AECT 2019
作者: Ahmad, Jawad Tahir, Ahsen Khan, Jan Sher Jameel, Atif Abbasi, Qammer H Buchanan, William Edinburgh Napier University School of Computing United Kingdom University of Engineering and Technology Department of Electrical Engineering Lahore Pakistan University of Gaziantep Department of Electrical Engineering Turkey Pakistan Institute of Engineering and Applied Science Department of Electrical Engineering Nilore Pakistan University of Glasgow School of Engineering United Kingdom
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512)... 详细信息
来源: 评论
Autosophy information theory provides lossless data and video compression based on the data content
Autosophy information theory provides lossless data and vide...
收藏 引用
conference on Digital compression technologies and Systems for Video Communications
作者: Holtz, K Holtz, E Holtz, D OMNI DIMENS NETWORKS SAN FRANCISCOCA 94109
A new autosophy information theory provides an alternative to the classical Shannon information theory. Using the new theory in communication networks provides both a high degree of lossless compression and virtually ... 详细信息
来源: 评论