咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是161-170 订阅
A Novel Multi-Chaos Based Compressive Sensing encryption Technique
A Novel Multi-Chaos Based Compressive Sensing Encryption Tec...
收藏 引用
Advances in the Emerging Computing technologies (AECT), International conference on
作者: Jawad Ahmad Ahsen Tahir Jan Sher Khan Atif Jameel Qammer H Abbasi William Buchanan School of Computing Edinburgh Napier University United Kingdom Department of Electrical Engineering University of Engineering and Technology Lahore Pakistan Department of Electrical Engineering University of Gaziantep Turkey Department of Electrical Engineering Pakistan Institute of Engineering and Applied Science Nilore Pakistan School of Engineering University of Glasgow United Kingdom
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512)... 详细信息
来源: 评论
image steganography with using QR code and cryptography
Image steganography with using QR code and cryptography
收藏 引用
International conference on Radioelektronika
作者: Vladimír Hajduk Martin Broda Ondrej Kováč Dušan Levický Dept. of Electronics and Multimedia Communications Dept. of Technologies and Electronics Technical University of Košice Košice Slovak Republic
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is... 详细信息
来源: 评论
An alternative method for image encryption by using Neural Networks
An alternative method for Image Encryption by using Neural N...
收藏 引用
International conference on Computing and Networking Technology (ICCNT)
作者: Satyanarayana Vollala Department of Computer Science and Engineering International Institute of Information Technology-Naya Raipur India
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug... 详细信息
来源: 评论
A Robust Medical image Watermarking Approach Based on K-Level Clustering and Asymmetric encryption
A Robust Medical Image Watermarking Approach Based on K-Leve...
收藏 引用
Innovative and Intelligent Information technologies (IC3IT), International conference on
作者: Mohammed Elhabib Kahla Mounir Beggas Abdelkader Laouid Ahcene Bounceur Mostefa Kara Computer Science Department LIAP Laboratory University of El Oued El Oued Algeria Information & Computer Science Department University of Sharjah Sharjah United Arab Emirates Interdisciplinary Research Center for Intelligent Secure Systems (IRC-ISS) King Fahd University of Petroleum and Minerals (KFUPM) Dhahran Saudi Arabia
The increasing use of digital medical images in healthcare has raised significant concerns regarding their security, privacy, and integrity during transmission and storage. Unauthorized access, tampering, and image ma... 详细信息
来源: 评论
High capacity steganography technique based on wavelet transform
High capacity steganography technique based on wavelet trans...
收藏 引用
Online International conference on Green Engineering and technologies (IC-GET)
作者: V. Divya N. Sasirekha Dept. of Electronics and Communication Engineering Sona College of Technology (Autonomous) Salem Tamil Nadu INDIA
For secured communication of information steganography is preferred, which embeds the information in a cover object. The objective is to propose a modified high-capacity steganography technique based on wavelet transf... 详细信息
来源: 评论
GEZGIN-2: an advanced image processing subsystem for Earth-observing small satellites
GEZGIN-2: an advanced image processing subsystem for Earth-o...
收藏 引用
International conference on Recent Advances in Space technologies (RAST)
作者: N. Ismailoglu O. Benderli S. Yesil R. Sever B. Okcan R. Oktem TUBITAK-BILTEN Middle East Technical University Ankara Turkey Atilim University Ankara Turkey
GEZGIN-2 is a real-time image processing subsystem, currently being developed for RASAT, the second small satellite to be launched by TUBITAK-BILTEN, in 2007. It is an advanced version of the GEZGIN payload, implement... 详细信息
来源: 评论
Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic encryption
Robust Blind and Secure Biometric Watermarking Based on Part...
收藏 引用
New technologies, Mobility and Security (NTMS)
作者: Mohamed S. El-Mahallawy Esam A. Hagras Ahmed Zein Eldin Mohamed Waleed Fakhr Arab Academy for Science Technology and Maritime Transport Cairo Egypt Faculty of Engineering Alexandria University Alexandria Egypt
In this paper, a novel Commutative Watermarking and Partial encryption (CWPE) algorithm using single level 2-Dimension Discrete Wavelet Transform (CWPE 2D DWT) and Multi-Map Orbit Hopping Chaotic System (MMOH-CS) is p... 详细信息
来源: 评论
Correlation-based target detection for the Navy's SHARP sensor suite
Correlation-based target detection for the Navy's SHARP sens...
收藏 引用
14th conference on Automatic Target Recognition
作者: Topiwala, P Casasent, D FastVDO LLC Columbia MD 21046 USA
High resolution, high data rate sensor streams acquired from the Navy Shared Reconnaissance Pod In (SHARP), encompassing unsurpassed resolution EO and IR sensors, covering large tactical areas with detailed surveillan... 详细信息
来源: 评论
A new selective encryption technique of JPEG2000 codestream for medical images transmission
A new selective encryption technique of JPEG2000 codestream ...
收藏 引用
IEEE SSD International Multi-conference on Systems, Signals and Devices
作者: Zahia Brahimi Hamid Bessalah A. Tarabet M. K. Kholladi Centre de Dévelopment des Technologies Avancées Algeria Université Mohammed Mentouri de Constantine Algeria
In this paper, a novel selective encryption image scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduc... 详细信息
来源: 评论
A Deep Learning-Cryptography Hybrid Approach for Ensuring Medical image Confidentiality
A Deep Learning-Cryptography Hybrid Approach for Ensuring Me...
收藏 引用
Electrical, Electronics, Information and Communication technologies (ICEEICT), International conference on
作者: Hitesh Surya Chinta Maganti Akshita Uma Sai Kavitha C.R Department of Computer Science & Engineering Amrita School of Computing Bengaluru India
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryp... 详细信息
来源: 评论