咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是111-120 订阅
An Effective Mechanism for the Secure Transmission of Medical images Using compression and Public Key encryption Mechanism  4th
An Effective Mechanism for the Secure Transmission of Medica...
收藏 引用
4th International conference on Smart Computing and Informatics, SCI 2020
作者: Ratheesh, T.K. Paul, Varghese Division of Information Technology CUSAT SoE Kochi India
In medical image applications, the diagnostic observations of a patient are transmitted to a remote location through internet. Since the information being transmitted is really sensitive as far as the diagnosis is con... 详细信息
来源: 评论
Security for real-time MPEG compressed video in distributed multimedia applications
Security for real-time MPEG compressed video in distributed ...
收藏 引用
Proceedings of the 1996 IEEE 15th Annual International Phoenix conference on Computers and Communications
作者: Spanos, George Anatassios Maples, Tracy Bradley Aerospace Corp United States
Emerging computer network technologies promise to provide distributed multimedia in real-time. The security of real-time video, an important component of distributed multimedia applications, is increasingly becoming o... 详细信息
来源: 评论
Secure Medical Data Transmission In Iot Healthcare: Hybrid encryption, Post-Quantum Cryptography, And Deep Learning-Enhanced Approach
Secure Medical Data Transmission In Iot Healthcare: Hybrid E...
收藏 引用
2023 IEEE Global conference on Information technologies and Communications, GCITC 2023
作者: Karthikeyan, D. Amrita School of Engineering Department of Technology Kerala Vallikavu690525 India
In the realm of IoT healthcare, safeguarding medical data is of paramount importance. This study introduces a comprehensive approach that combines hybrid encryption, post-quantum cryptography, and deep learning techni... 详细信息
来源: 评论
encryption-then-compression techniques: A survey
Encryption-then-compression techniques: A survey
收藏 引用
International conference on Control, Instrumentation, Communication and Computational technologies (ICCICCT)
作者: S. Shunmugan P. Arockia Jansi Rani Research Scholar Manonmaniam Sundaranar University Tirunelveli Tamil Nadu IN
This paper presents the concept of image compression after encryption and study about the various technologies applied on encryption-then-compression technology. It is also analyses the various secured compression tec... 详细信息
来源: 评论
Sub-Band Exchange DWT Based image Fusion Algorithm for Enhanced Security  3
Sub-Band Exchange DWT Based Image Fusion Algorithm for Enhan...
收藏 引用
3rd International conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: Baviskar, Jaypal Mulla, Afshan Kudu, Neha Parthsarathy, Aditi Baviskar, Amol Intelligent Commun Lab Bombay 400089 Maharashtra India Dwarkadas J Sanghvi Coll Engn Dept Elect Engn Bombay 400056 Maharashtra India Univ Coll Engn Dept Elect Engn Vasai 401202 India
Transmission of critical data over the link, in the presence of an attacker has augmented the demand for secure communication. Particularly in the military field, exchange of classified images has to be executed with ... 详细信息
来源: 评论
2017 International conference on Algorithms, Methodology, Models and Applications in Emerging technologies, ICAMMAET 2017
2017 International Conference on Algorithms, Methodology, Mo...
收藏 引用
2017 International conference on Algorithms, Methodology, Models and Applications in Emerging technologies, ICAMMAET 2017
The proceedings contain 130 papers. The topics discussed include: application of cloud computing in biomedicine big data analysis cloud computing in big data;analysis on the development of the evaluation methods for m...
来源: 评论
Enhanced Reversible Data Hiding Scheme Based on DCT Coefficients in JPEG compression  7
Enhanced Reversible Data Hiding Scheme Based on DCT Coeffici...
收藏 引用
7th International conference on Circuit Power and Computing technologies, ICCPCT 2024
作者: Sudhakar, S. Dinesh Kumar, T.R. Sivasaravana Babu, S. Chandravel, M. Paul, A. Joshua Karthick Selvam, I. Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Electronics and Communication Engineering Chennai India
Data hiding approaches in Joint Photographic Experts Group (JPEG) compression that use discrete cosine transform (DCT) coefficients are gaining popularity due to their capacity to integrate more data into JPEG picture... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted image Based on Flipping MSB encryption Process  20
Reversible Data Hiding in Encrypted Image Based on Flipping ...
收藏 引用
6th International conference on Frontiers of Educational technologies, ICFET 2020 and its Workshop 2020 5th International conference on Knowledge Engineering and Applications, ICKEA 2020
作者: Weng, Chi-Yao Yang, Cheng-Hsing Hsu, Guang-Yih Chen, Rong-Jaye Li, Chun-Ta Department of Computer Science National Pingtung University Pingtung Taiwan Department of Computer Science National Chiao Tung University Hsinchu Taiwan Department of Information Management Tainan University of Technology Tainan Taiwan
A novel reversible data hiding method based on vacating room for specific encryption process in encrypted image is proposed by Huang and Wang in 2020. In their method, they applied pixel value expansion approach to va... 详细信息
来源: 评论
SPIRT compression on encrypted images
SPIRT compression on encrypted images
收藏 引用
IEEE conference on Information & Communication technologies (ICT)
作者: C. Rengarajaswamy S. Imaculate Rosaline Department of Electronics and Communication Engineering Oxford Engineering College UK
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highl... 详细信息
来源: 评论
image encryption Based on Watermarking and Chaotic Masks Using SVD
Image Encryption Based on Watermarking and Chaotic Masks Usi...
收藏 引用
Virtual International conference on Futuristic Communication and Network technologies, VICFCNT 2021
作者: Girija, R. Jayalakshmi, S.L. Vedhapriyavadhana, R. Manav Rachna University Faridabad India Puducherry India Vellore Institute of Technology Chennai India
In an era of large information and systems administration, it is an important to create a safe and hearty computerized watermarking plan with high computational productivity to secure copyrights of advanced works. Non... 详细信息
来源: 评论