咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是11-20 订阅
排序:
Crypto-compression of images based on Chaos
Crypto-Compression of Images based on Chaos
收藏 引用
6th International conference on Sciences of Electronics, technologies of Information and Telecommunications (SETIT)
作者: Hajji, Jalel Ben Farah, Mohamed Amine Samet, Mounir Kachouri, Abdennaceur Sfax Univ Natl Engn Sch Sfax Lab Elect & Informat Technol Sfax Tunisia Gabes Univ Higher Inst Ind Syst Gabes Tunisia
In this paper we have proposed an image crypto-compression system that guarantees a secure storage and transfer while preserving the performance of the used compression method. Regarding compression, we have chosen to... 详细信息
来源: 评论
image compression-encryption Scheme Based on 2D DWT, SPIHT and Qi Hyper-chaos
Image Compression-Encryption Scheme Based on 2D DWT, SPIHT a...
收藏 引用
27th Southern African Universities Power Engineering conference (SAUPEC) / 11th Robotics and Mechatronics conference of South Africa (RobMech) / 29th Annual Symposium of Pattern-Recognition-Association-of-South-Africa (PRASA)
作者: Lisungu, Tresor Oteko Sumbwanyambe, Mbuyu Univ South Africa Dept Elect & Min Engn Johannesburg South Africa
With an ever increase usage of multi-media content, such audio, image and video across networks, image compression and security of content has become almost a need to users who would want to transmit over such network... 详细信息
来源: 评论
New image encryption and compression Method Based on Independent Component Analysis
New Image Encryption and Compression Method Based on Indepen...
收藏 引用
3rd International conference on Information and Communication technologies
作者: Ito, Masanori Ohnishi, Noboru Alfalou, Ayman Mansour, Ali Nagoya Univ Grad Sch Informat Sci Chikusa Ku Furo Cho Nagoya Aichi 4648603 Japan
For telecommunication systems, various compression and encryption techniques are proposed to satisfy a fast and secure transmission. However these two techniques have been studied separately. In this paper we propose ... 详细信息
来源: 评论
image encryption Utilizing Lossy image compression  1
Image Encryption Utilizing Lossy Image compression
收藏 引用
International conference on Computer Communications and Electronics (Comptelix)
作者: Mishra, Kapil Saharan, Ravi Cent Univ Rajasthan Comp Sci & Engn Dept NH-8 Bandarsindri Kishangarh India
As the network technologies are improving, more challenges are coming forward in form of huge amount of data being transferred through the network. A large portion of such data is of multimedia type consisting of huge... 详细信息
来源: 评论
SPIRT compression on encrypted images
SPIRT compression on encrypted images
收藏 引用
2013 IEEE conference on Information and Communication technologies, ICT 2013
作者: Rengarajaswamy, C. Rosaline, S. Imaculate Department of Electronics and Communication Engineering Oxford Engineering College India
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highl... 详细信息
来源: 评论
Research on wavelet-fractal coding of image sequence
Research on wavelet-fractal coding of image sequence
收藏 引用
conference on image compression and encryption technologies
作者: Zhang, ZM Yu, S Tianjin Univ Inst TV & Image Informat Tianjin 300072 Peoples R China
In this paper, a new image sequence compression scheme combining wavelet with fractal is presented. It adopts the coding structure similar to MPEG's except replacing DCT transform with wavelet transform, and uses ... 详细信息
来源: 评论
image encryption Using Separable Reversible Data Hiding Scheme
Image Encryption Using Separable Reversible Data Hiding Sche...
收藏 引用
4th International conference on Computing, Communications and Networking technologies (ICCCNT)
作者: Smitha, M. Jayanthi, V. E. Merlin, Ajitha
image encryption has a significant role in the field of cryptography. A new encryption scheme is introduced to protect an image from unauthorized access, in this scheme two separate keys are used for image encryption ... 详细信息
来源: 评论
Item Recommendation based on Multimedia Variational Autoencoder
Item Recommendation based on Multimedia Variational Autoenco...
收藏 引用
Asia conference on Geological Research and Environmental Technology (GRET)
作者: Ran, Yu Chen, Ziyu Mu, Yilin Univ Int Business & Econ Sch Informat Technol & Management Beijing 100029 Peoples R China Dalian Ocean Univ Coll Fisheries & Life Sci Dalian 116023 Liaoning Peoples R China Lanzhou Univ Technol Sch Mech & Elect Engn Lanzhou 730050 Gansu Peoples R China
At present, with the rapid development of science and technology and the rapid development of computer related technology, with the development of this series of technologies, multimedia communication has rapidly beco... 详细信息
来源: 评论
Decorrelation of multispectral images for lossless compression
Decorrelation of multispectral images for lossless compressi...
收藏 引用
conference on image compression and encryption technologies
作者: Zhang, R Liu, ZK Yu, NG Univ Sci & Technol China Hefei 230026 Peoples R China
Decorrelation is the most important step in lossless compression. There are spatial and spectral redundancies in multispectral images. In this paper, we proposed a new technique that integer wavelet transform is used ... 详细信息
来源: 评论
Near-lossless image compression based on integer wavelet transforms
Near-lossless image compression based on integer wavelet tra...
收藏 引用
conference on image compression and encryption technologies
作者: Moon, YS Tian, JW Chinese Univ Hong Kong Dept Comp Sci & Engn Shatin Hong Kong Peoples R China
This paper discusses the constructing method of a general integer wavelet transform algorithm. Coupling such an algorithm with subblock differential pulse code modulation (DPCM), an encoding scheme for near-lossless i... 详细信息
来源: 评论