咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 38 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 image encryption
  • 9 篇 watermarking
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 173 篇 英文
  • 8 篇 其他
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是11-20 订阅
排序:
On the Classification of Digital images Processed by the DAC Algorithm  17
On the Classification of Digital Images Processed by the DAC...
收藏 引用
17th IEEE International conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2024
作者: Makarichev, Viktor Lukin, Vladimir Brysina, Iryna National Aerospace University 'KhAI' Dept. of Information-Communication Technologies Kharkiv Ukraine Aerospace University 'KhAI' Dept. of Higher Mathematics and System Analysis National Kharkiv Ukraine
image classification is an essential part of computer vision. A lot of approaches, in particular, based on applying convolutional neural networks have been proposed. In this paper, we investigate the impact of discret... 详细信息
来源: 评论
Enhanced Reversible Data Hiding Scheme Based on DCT Coefficients in JPEG compression  7
Enhanced Reversible Data Hiding Scheme Based on DCT Coeffici...
收藏 引用
7th International conference on Circuit Power and Computing technologies, ICCPCT 2024
作者: Sudhakar, S. Dinesh Kumar, T.R. Sivasaravana Babu, S. Chandravel, M. Paul, A. Joshua Karthick Selvam, I. Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Electronics and Communication Engineering Chennai India
Data hiding approaches in Joint Photographic Experts Group (JPEG) compression that use discrete cosine transform (DCT) coefficients are gaining popularity due to their capacity to integrate more data into JPEG picture... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted image Based on Block and Huffman Encoding  2nd
Reversible Data Hiding in Encrypted Image Based on Block and...
收藏 引用
2nd International conference on Security and Information technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Yang, Cheng-Hsing Weng, Chi-Yao Huang, Bo-Han Huang, Wei-Qing Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung900 Taiwan Department of Computer Science and Information Engineering National Chiayi University Chiayi600 Taiwan
The paper presents a reversible data hiding method with image compression consisting of Huffman coding and block encrypted. In the proposed approach, the image is used to compressed for generating the specified space ... 详细信息
来源: 评论
A Deep Learning-Cryptography Hybrid Approach for Ensuring Medical image Confidentiality  3
A Deep Learning-Cryptography Hybrid Approach for Ensuring Me...
收藏 引用
3rd International conference on Electrical, Electronics, Information and Communication technologies, ICEEICT 2024
作者: Chinta, Hitesh Surya Sai, Maganti Akshita Uma Kavitha, C.R. Amrita School of Computing Department of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryp... 详细信息
来源: 评论
A Review on Hybrid Cryptography approach with Steganography  12
A Review on Hybrid Cryptography approach with Steganography
收藏 引用
12th International conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Badhan, Akash Malhi, Simarjit Singh Phagwara India
In today’s era of technology, the unmeasurable data is being exchanged over the internet per second. So, for data transmission or data communication the cloud storage platforms were introduced for robust communicatio... 详细信息
来源: 评论
Secure Medical Data Transmission In Iot Healthcare: Hybrid encryption, Post-Quantum Cryptography, And Deep Learning-Enhanced Approach
Secure Medical Data Transmission In Iot Healthcare: Hybrid E...
收藏 引用
2023 IEEE Global conference on Information technologies and Communications, GCITC 2023
作者: Karthikeyan, D. Amrita School of Engineering Department of Technology Kerala Vallikavu690525 India
In the realm of IoT healthcare, safeguarding medical data is of paramount importance. This study introduces a comprehensive approach that combines hybrid encryption, post-quantum cryptography, and deep learning techni... 详细信息
来源: 评论
A Privacy-Preserving image Retrieval Scheme with a Mixture of Plain and EtC images  4
A Privacy-Preserving Image Retrieval Scheme with a Mixture o...
收藏 引用
4th IEEE Global conference on Life Sciences and technologies, LifeTech 2022
作者: Iida, Kenta Kiya, Hitoshi Tokyo Metropolitan University Tokyo Japan
In this paper, we propose a novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images."In the... 详细信息
来源: 评论
IRIS image encryption and Decryption Based Application Using Chaos System and Confusion Technique
收藏 引用
International conference on Modeling, Simulation and Optimization, CoMSO 2021
作者: Archana, K. Kumar, Sharath Sashi Gokak, Pradeep P. Pragna, M. Shruthi, M.L.J. Department of Electronics and Communication Engineering PES University RR Campus Karnataka Bangalore India
In today’s era, Digital image Security is of primary importance and is receiving a huge amount of consideration. Because digital photographs are used in almost all technological fields, confidential data may be prese... 详细信息
来源: 评论
Visually Meaningful image encryption Algorithm Based on Parallel Compressive Sensing and Cellular Neural Network  4th
Visually Meaningful Image Encryption Algorithm Based on Para...
收藏 引用
4th International conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2021
作者: Zhang, Renxiu Jiang, Donghua Ding, Wei Wang, Ya Wu, Yanan Guang, Yerui Ding, Qun Electronic Engineering College Heilongjiang University Harbin150080 China School of Information Engineering Chang’an University Xi’an710064 China
At present, most image encryption algorithms protect the image by converting the original image into a visually meaningless noise-like image. However, the noise-like image can easily attract the attention of attackers... 详细信息
来源: 评论
Enhancing Data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and compression Algortihm
Enhancing Data Security and Efficiency: A Hybrid Cryptograph...
收藏 引用
Intelligent Data Communication technologies and Internet of Things (IDCIoT), International conference on
作者: Akash Badhan Simarjit Singh Malhi School of Computer Science and Engineering Lovely Professional University Phagwara India
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and ... 详细信息
来源: 评论