咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是141-150 订阅
排序:
The implementation of chaotic encryption scheme for images
The implementation of chaotic encryption scheme for images
收藏 引用
International conference on Control, Instrumentation, Communication and Computational technologies (ICCICCT)
作者: Veenus P K K Sivasankar Vivek P K V S Dharun Department of CSE Noorul Islam University Kumaracoil Tamil Nadu India Department of IT Noorul Islam University Kumaracoil Tamil Nadu India Department of ECE METS School of Engg Mala Kerala India
The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is pro... 详细信息
来源: 评论
7th International conference on Trends in Electronics and Informatics, ICOEI 2023 - Proceedings
7th International Conference on Trends in Electronics and In...
收藏 引用
7th International conference on Trends in Electronics and Informatics, ICOEI 2023
The proceedings contain 268 papers. The topics discussed include: independent PV-battery systems by combining autonomous incremental conductance particle swarm technique with a power management circuitry;utilizing mac...
来源: 评论
image encryption using separable reversible data hiding scheme
Image encryption using separable reversible data hiding sche...
收藏 引用
International conference on Computing and Networking Technology (ICCNT)
作者: M. Smitha V. E. Jayanthi Ajitha Merlin Distributed Systems Group Vienna University of Technology Vienna Austria Research Group Software Architecture University of Vienna Vienna Austria
image encryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for image encryption ... 详细信息
来源: 评论
Securing Medical images using compression techniques with encryption and image Steganography
Securing Medical Images using Compression techniques with en...
收藏 引用
Intelligent technologies (CONIT), International conference on
作者: Pooranakala K. Vanita Jaitly Department of Computer Applications Hindustan Institute of Technology and Science Chennai Tamil Nadu India
Medical imaging is an essential component of the healthcare sector, enabling the transfer of medical images between widely separated locations to improve healthcare business practices. However, the transmission of med...
来源: 评论
Effect on Reconstruction of images by Applying Fractal Based Lossy compression Followed by Symmetrical encryption Techniques
Effect on Reconstruction of Images by Applying Fractal Based...
收藏 引用
International conference on Computing and Networking Technology (ICCNT)
作者: Neetu Gupta Ritu Vijay Banasthali University Banasthali India Banasthali University Banasthali Indi
compression and encryption are two major aspects of cryptanalysis. compression reduces the large bandwidth requirement while encryption provides security against differential unethical attacks during transmission of i... 详细信息
来源: 评论
Motion vectors signs encryption for H.264/AVC
Motion vectors signs encryption for H.264/AVC
收藏 引用
International conference on Advanced technologies for Signal and image Processing (ATSIP)
作者: N. Khlif T. Damak F. Kammoun N. Masmoudi Electrical department National School of Engineers of Sfax (ENIS) Sfax Tunisia
Currently, research is focused on selective encryption to protect movies against attacks transmitted over a public network. This choice is taken to ensure the security of compressed data without adding an important su... 详细信息
来源: 评论
Congress on Smart Computing technologies, CSCT 2022
Congress on Smart Computing Technologies, CSCT 2022
收藏 引用
Congress on Smart Computing technologies, CSCT 2022
The proceedings contain 40 papers. The special focus in this conference is on Smart Computing technologies. The topics include: An Interactive Voicebot for Visually Challenged: Empowering the Realm Among Deaf-Mute and...
来源: 评论
Cryptanalysis of secure arithmetic coding based on interval swapping
Cryptanalysis of secure arithmetic coding based on interval ...
收藏 引用
International conference & Expo on Emerging technologies for a Smarter World (CEWIT)
作者: Tao Xiang Chenyun Yu Jinyu Qu Xinwen Fu Department of Computer Science Chongqing University Chongqing China Department of Computer Science University of Massachusetts Lowell Lowell MA USA
Arithmetic coding is prevalent in compression for its remarkable performance, and it is also explored to design encryption schemes offering compression and secrecy simultaneously. Joint compression and encryption is a... 详细信息
来源: 评论
A Hybrid Data Security Technique Using Chaos encryption, RC4 encryption, Huffman Data compression and LSB Steganography
A Hybrid Data Security Technique Using Chaos Encryption, RC4...
收藏 引用
Device Intelligence, Computing and Communication technologies, (DICCT), International conference on
作者: Lalit Negi Sandeep Kumar Manisha Bharti Department of ECE National Institute of Technology Delhi New Delhi India
Data must be compressed before being sent online, saving money and time. Encrypting the data and compressing it are also necessary to ensure secure and fast data transmission over the internet. This study presents an ... 详细信息
来源: 评论
A Survey on image encryption using Elliptic Curve Cryptography
A Survey on Image Encryption using Elliptic Curve Cryptograp...
收藏 引用
International conference on Inventive Computation technologies (ICICT)
作者: Mothukuri Mani Deep Mamidi Naveen Durga Praveen Patnana Sai Deekshith Perla Viswa Teja Sathish Kumar Kannaiah K V Prasad Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Ap India
Elliptic Curve Cryptography (ECC) is a way to keep information secure. It is better than RSA because it can provide the same level of security with smaller codes. This causes less use of resources and lower memory nee... 详细信息
来源: 评论