咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是151-160 订阅
排序:
encryption of lossless coded videos
Encryption of lossless coded videos
收藏 引用
International conference on Internet of Things, Embedded Systems and Communications (IINTEC)
作者: Donia Ammous Naziha Khlif Fahmi Kammoun Nouri Masmoudi University of Sfax National School of Engineers of Sfax Laboratory of Electronics and Information Technologies Circuit and System Team “C&S” Sfax Tunisie
Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video...
来源: 评论
A Lightweight Spatio-Color Scrambled EtC System for JPEG XS Standard
A Lightweight Spatio-Color Scrambled EtC System for JPEG XS ...
收藏 引用
International conference on Information and Computer technologies (ICICT)
作者: Takayuki Nakachi Hiroyuki Kimiyama Mitsuru Maruyama University of the Ryukyus Nishihara Japan Daido University Nagoya Japan Kanagawa Institute of Technology Atsugi Japan
In this paper, we propose a spatio-color scrambled encryption-then-compression (EtC) system for the JPEG XS standard to enhance security and invisibility. Previously, a line-based spatial scrambling scheme compatible ... 详细信息
来源: 评论
2nd EAI International conference on Industrial IoT technologies and Applications, Industrial IoT 2017
2nd EAI International Conference on Industrial IoT Technolog...
收藏 引用
2nd EAI International conference on Industrial IoT technologies and Applications, Industrial IoT 2017
The proceedings contain 25 papers. The special focus in this conference is on Industrial IoT technologies and Applications. The topics include: Bound analysis for anchor selection in cooperative localization;rechargin...
来源: 评论
Blended Vector Matrix on Different Channels of image encryption with Multi-Level Distinct Frequency Based Chaotic Approach to Prevent Cyber Crimes by Using Affine Transformation
Blended Vector Matrix on Different Channels of Image Encrypt...
收藏 引用
International conference on Inventive Communication and Computational technologies (ICICCT)
作者: Harsh Mathur S. Veenadhari AISECT University Bhopal
Security attacks through Internet has proliferated in recent years. Henceforth, information security is a challenge of very serious global concern of the present time. The protection of image data from unauthorized ac... 详细信息
来源: 评论
SecretPixel: Advanced Steganography with Seeded Random Embedding and AES-RSA encryption
SecretPixel: Advanced Steganography with Seeded Random Embed...
收藏 引用
Intelligent Signal Processing and Effective Communication technologies (INSPECT), IEEE International conference on
作者: Aditya Barnwal Aryman Sah Rajkumar S Naman Umesh Khera Rohan Srivastav Achyuthan Sivasankar SCOPE Vellore Institure of Technology Vellore India
This paper presents SecretPixel, a steganographic tool that integrates random embedding techniques and advanced encryption to securely hide data within images. SecretPixel ensures confidentiality and integrity of the ... 详细信息
来源: 评论
21st International conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
21st International Conference on Parallel and Distributed Co...
收藏 引用
21st International conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
The proceedings contain 35 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications, and technologies. The topics include: On the Non-ergodic Convergence Rate of the Directed...
来源: 评论
Ownership Authentication and Tamper Detection in Digital images via Zero-Watermarking  45
Ownership Authentication and Tamper Detection in Digital Ima...
收藏 引用
45th International conference on Telecommunications and Signal Processing (TSP)
作者: Morales-Ortega, Adrian Cedillo-Hernandez, Manuel Inst Politecn Nacl ESIME Culhuacan Secc Estudios Posgrad & Invest Mexico City DF Mexico
This paper presents a new zero-watermarking algorithm for digital images. The main challenge in every zero-watermarking algorithm is to create a highly capable, reliable, and distortion-free scheme. Unlike other zero-... 详细信息
来源: 评论
25th International Computer Symposium on New Trends in Computer technologies and Applications, ICS 2022
25th International Computer Symposium on New Trends in Compu...
收藏 引用
25th International Computer Symposium on New Trends in Computer technologies and Applications, ICS 2022
The proceedings contain 59 papers. The special focus in this conference is on New Trends in Computer technologies and Applications. The topics include: Prediction of Middle-Aged Unhealthy Facial Skin Using VGG19 ...
来源: 评论
15th International conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2019, held in conjunction with the 12th International conference on Frontiers of Information Technology, Applications and Tools, FITAT 2019
15th International Conference on Intelligent Information Hid...
收藏 引用
15th International conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2019, held in conjunction with the 12th International conference on Frontiers of Information Technology, Applications and Tools, FITAT 2019
The proceedings contain 95 papers. The special focus in this conference is on Intelligent Information Hiding and Multimedia Signal Processing. The topics include: Power Plant Fan Fault Warning Based on Bidirectional F...
来源: 评论
Enhancing Data Privacy through a Secure Data Hiding Approach Integrated with Lossless compression
Enhancing Data Privacy through a Secure Data Hiding Approach...
收藏 引用
International conference on Inventive Computation technologies (ICICT)
作者: Manjula M Kakoli Bora Shaila S G Skanda N Raj Thilak R Akanksha Kanchireddy Dept of CSE(Data Science) Dayananda Sagar University Bangalore India
In the contemporary digital landscape, characterized by ubiquitous internet connectivity and broad photo sharing, protecting secret data within photographs is becoming increasingly important. This study describes an i... 详细信息
来源: 评论