咨询与建议

限定检索结果

文献类型

  • 181 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 58 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 29 篇 电气工程
    • 25 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 3 篇 轻工技术与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
  • 72 篇 理学
    • 49 篇 物理学
    • 21 篇 数学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 51 篇 医学
    • 49 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
  • 8 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 43 篇 encryption
  • 33 篇 image coding
  • 24 篇 image compressio...
  • 20 篇 cryptography
  • 12 篇 compression
  • 11 篇 discrete cosine ...
  • 10 篇 discrete wavelet...
  • 10 篇 steganography
  • 10 篇 transform coding
  • 9 篇 watermarking
  • 8 篇 image encryption
  • 7 篇 image processing
  • 7 篇 chaos
  • 6 篇 data compression
  • 5 篇 security
  • 5 篇 image color anal...
  • 5 篇 streaming media
  • 5 篇 vector quantizat...
  • 5 篇 robustness
  • 4 篇 dwt

机构

  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 nanjing univ sci...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 atilim universit...
  • 2 篇 univ sfax higher...
  • 1 篇 digimarc corp tu...
  • 1 篇 no jiaotong univ...
  • 1 篇 school of engine...
  • 1 篇 national institu...
  • 1 篇 koneru lakshmaia...
  • 1 篇 tianjin univ ins...
  • 1 篇 northcap univ cs...

作者

  • 3 篇 yang jy
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 sun xh
  • 2 篇 lukin vladimir
  • 2 篇 makarichev vikto...
  • 2 篇 ahuja bharti
  • 2 篇 r. sever
  • 2 篇 sun sh
  • 2 篇 mo yl
  • 2 篇 b. okcan
  • 2 篇 jawad ahmad
  • 2 篇 yang cheng-hsing
  • 2 篇 badhan akash
  • 2 篇 tao hj
  • 2 篇 tong xf
  • 2 篇 abdmouleh med ka...
  • 2 篇 malhi simarjit s...
  • 2 篇 liu j
  • 2 篇 weng chi-yao

语言

  • 178 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Conference on Image Compression and Encryption Technologies"
181 条 记 录,以下是81-90 订阅
排序:
3-D scattered dataset compression based on Gaussian curvature
3-D scattered dataset compression based on Gaussian curvatur...
收藏 引用
conference on image compression and encryption technologies
作者: Li, ZY Li, DH Tang, SW Jing, X Peking Univ Ctr Informat Sci Beijing 100871 Peoples R China
A compression method of 3D scattered dataset based on octree is proposed in this paper. The Gaussian curvature of a surface is used as the criterion to compress the dataset. The points containing more structural infor... 详细信息
来源: 评论
encryption of lossless coded videos
Encryption of lossless coded videos
收藏 引用
2019 International conference on Internet of Things, Embedded Systems and Communications, IINTEC 2019
作者: Ammous, Donia Khlif, Naziha Kammoun, Fahmi Masmoudi, Nouri University of Sfax National School of Engineers of Sfax Laboratory of Electronics and Information Technologies Circuit and System Team 'CS' Sfax3038 Tunisia
Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video... 详细信息
来源: 评论
An Authenticated Encrypted Compressive Sensing based Imaging Mechanism  9
An Authenticated Encrypted Compressive Sensing based Imaging...
收藏 引用
9th IFIP International conference on New technologies, Mobility and Security (NTMS)
作者: Wu, Tao Ruland, Christoph Univ Siegen Chair Data Commun Syst Siegen Germany
Compressive Sensing (CS) based imaging (CSI) method can recover N pixel information from only M measurements with N >> M, if the source information is sparse in some domain. With help of CSI mechanism an imaging... 详细信息
来源: 评论
An alternative method for image encryption by using Neural Networks  15
An alternative method for Image Encryption by using Neural N...
收藏 引用
15th International conference on Computing Communication and Networking technologies, ICCCNT 2024
作者: Vollala, Satyanarayana International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug... 详细信息
来源: 评论
The IP-based storage of image information
The IP-based storage of image information
收藏 引用
conference on image compression and encryption technologies
作者: Fu, XL Xie, CS Liu, ZB Huazhong Univ Sci & Technol Natl Storage Syst Lab Comp Sch Wuhan 430074 Peoples R China
With the fast growth of data in multispectral image processing, the traditional storage architecture was challenged, It is currently being replaced by Storage Area Networks (SAN), which makes storage devices externali... 详细信息
来源: 评论
IRIS image encryption and Decryption Based Application Using Chaos System and Confusion Technique
收藏 引用
International conference on Modeling, Simulation and Optimization, CoMSO 2021
作者: Archana, K. Kumar, Sharath Sashi Gokak, Pradeep P. Pragna, M. Shruthi, M.L.J. Department of Electronics and Communication Engineering PES University RR Campus Karnataka Bangalore India
In today’s era, Digital image Security is of primary importance and is receiving a huge amount of consideration. Because digital photographs are used in almost all technological fields, confidential data may be prese... 详细信息
来源: 评论
Visually Meaningful image encryption Algorithm Based on Parallel Compressive Sensing and Cellular Neural Network  4th
Visually Meaningful Image Encryption Algorithm Based on Para...
收藏 引用
4th International conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2021
作者: Zhang, Renxiu Jiang, Donghua Ding, Wei Wang, Ya Wu, Yanan Guang, Yerui Ding, Qun Electronic Engineering College Heilongjiang University Harbin150080 China School of Information Engineering Chang’an University Xi’an710064 China
At present, most image encryption algorithms protect the image by converting the original image into a visually meaningless noise-like image. However, the noise-like image can easily attract the attention of attackers... 详细信息
来源: 评论
An energy-efficient image representation for secure mobile systems
收藏 引用
4th International IFIP-TC6 Networking conference
作者: Woo, T Gebotys, C Naik, S Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
In a mobile device, two major sources of energy consumption are energy used for computation and energy used for transmission. Computation energy can be reduced by minimizing the time spent on compression. Transmission... 详细信息
来源: 评论
Combination of neural network and advanced encryption and decryption technique is used for digital image watermarking
Combination of neural network and advanced encryption and de...
收藏 引用
5th International Symposium on Intelligent Systems technologies and Applications (ISTA) / International conference on Applied Soft Computing and Communication Networks (ACN)
作者: Gonge, Sudhanshu Suhas Vishwakarma Inst Technol Dept Comp Engn Pune Maharashtra India
The computer system represents data in various format viz (i) Audio, (ii) Video, (iii) Text, (iv) Message, and (v) image format. There are many ways through which, data can be easily transferred. The process of transf... 详细信息
来源: 评论
Radar signal compression using wavelet transforms
Radar signal compression using wavelet transforms
收藏 引用
conference on image compression and encryption technologies
作者: Zhou, Y Li, FP Xu, Y Qin, QQ Li, D Command Automat Engn Dept Wuhan 430010 Peoples R China
Generally, the echo of radar can be regarded as a combination of useful signal and noise. In this paper, an efficient wavelet-based non-linear signal compression scheme is presented, which takes full advantage of the ... 详细信息
来源: 评论