咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 12 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 3 篇 光学工程
    • 3 篇 测绘科学与技术
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
  • 12 篇 理学
    • 9 篇 数学
    • 8 篇 物理学
  • 5 篇 医学
    • 5 篇 临床医学

主题

  • 6 篇 encryption
  • 4 篇 image compressio...
  • 3 篇 image encryption
  • 3 篇 image coding
  • 2 篇 data compression
  • 2 篇 arithmetic codin...
  • 2 篇 chaos
  • 1 篇 symmetric key cr...
  • 1 篇 fuzzy sets
  • 1 篇 data security
  • 1 篇 interdomain
  • 1 篇 dcs.v2
  • 1 篇 video coding
  • 1 篇 variable model
  • 1 篇 roaming
  • 1 篇 algorithm develo...
  • 1 篇 interenterprise
  • 1 篇 videoconference
  • 1 篇 electronics
  • 1 篇 key exchange

机构

  • 2 篇 univ florida dep...
  • 1 篇 dept. of electri...
  • 1 篇 shinshu univ fac...
  • 1 篇 zhenjiang waterc...
  • 1 篇 zhenjiang waterc...
  • 1 篇 indian inst tech...
  • 1 篇 univ calif san d...
  • 1 篇 shinshu univ fac...
  • 1 篇 beijing univ tec...
  • 1 篇 tel aviv univ fa...
  • 1 篇 chongqing commun...
  • 1 篇 autosophy ca 941...
  • 1 篇 amer intercont u...
  • 1 篇 university of fl...
  • 1 篇 univ siena dept ...
  • 1 篇 mccarty & associ...
  • 1 篇 iit dept elect e...
  • 1 篇 queensland univ ...

作者

  • 2 篇 tanaka k
  • 1 篇 jia jia
  • 1 篇 astola jaakko t.
  • 1 篇 schmalz ms
  • 1 篇 bartolini f
  • 1 篇 kalienky d
  • 1 篇 yan lei
  • 1 篇 zhao bo
  • 1 篇 cappellini v
  • 1 篇 mark steven schm...
  • 1 篇 eckhouse v
  • 1 篇 ritter gerhard x...
  • 1 篇 newman r
  • 1 篇 pathak s
  • 1 篇 ishibashi h
  • 1 篇 society for indu...
  • 1 篇 magli e
  • 1 篇 mendlovic d
  • 1 篇 madasu vamsi kri...
  • 1 篇 olmo g

语言

  • 19 篇 英文
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption II"
19 条 记 录,以下是11-20 订阅
排序:
mathematics of data/image coding, compression, and encryption IV, with applications
Mathematics of data/image coding, compression, and encryptio...
收藏 引用
mathematics of data/image coding, compression, and encryption IV, with applications
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with Applications. The topics discussed include: improving wireless video communication withou... 详细信息
来源: 评论
Watermarking-based protection of remote sensing images: requirements and possible solutions
Watermarking-based protection of remote sensing images: requ...
收藏 引用
4th conference on mathematics of image and data coding, compression, and encryption
作者: Barni, M Bartolini, F Cappellini, V Magli, E Olmo, G Univ Siena Dept Informat Engn I-53100 Siena Italy
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and... 详细信息
来源: 评论
Implementation IDEA algorithm for image encryption
Implementation IDEA algorithm for image encryption
收藏 引用
conference on mathematics and Applications of data/image coding, compression, and encryption iiI
作者: Dang, PP Chau, PM Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA
In this paper, we present an implementation of the IDEA algorithm for image encryption. The image encryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method,... 详细信息
来源: 评论
Power- and space-efficient image computation with compressive processing. 1. Background and theory
Power- and space-efficient image computation with compressiv...
收藏 引用
conference on mathematics and Applications of data/image coding, compression, and encryption iiI
作者: Schmalz, MS Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
Surveillance imaging applications on small autonomous imaging platforms present challenges of highly constrained power supply and form factor, with potentially demanding specifications for target detection and recogni... 详细信息
来源: 评论
mathematics of data/image coding, compression and encryption ii
Mathematics of Data/Image Coding, Compression and Encryption...
收藏 引用
1999年
作者: Society For Indust Mark Steven Schmalz
来源: 评论
Truncated baker transformation and its extension to image encryption
Truncated baker transformation and its extension to image en...
收藏 引用
conference on mathematics of data/image coding, compression, and encryption ii
作者: Miyamoto, M Tanaka, K Sugimura, T Shinshu Univ Fac Engn Wakasato Nagano 3808553 Japan
This paper presents a new truncated Baker transformation with a finite precision and extends it to an efficient image encryption scheme. The truncated Baker transformation uses the quantization error as a secret key, ... 详细信息
来源: 评论
Encoded signal processes from chaotic solutions of a nonlinear integral equation
Encoded signal processes from chaotic solutions of a nonline...
收藏 引用
conference on mathematics of data/image coding, compression, and encryption
作者: McCarty, RC McCarty & Associates Gilroy CA 95020 USA
Recent studies have shown that chaotic processes provide an appropriate mechanism for the encryption of sensitive signal information. Thus, a Volterra nonlinear integral equation is used to generate such chaotic proce... 详细信息
来源: 评论
Proceedings of SPIE: mathematics of data/image coding, compression, and encryption
Proceedings of SPIE: Mathematics of Data/Image Coding, Compr...
收藏 引用
mathematics of data/image coding. compression, and encryption
This Volume 3456 of the conference proceedings contains 20 papers. Topics discussed include mathematics of data/image coding, compression and encryption, digital watermarking and encryption, image compression, error d... 详细信息
来源: 评论
Analysis of the DCS.v2 authentication protocol
Analysis of the DCS.v2 authentication protocol
收藏 引用
conference on mathematics of data/image coding, compression, and encryption
作者: Newman, R Dyson, L Sabina, O Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
Developers of the UF Distributed Conferencing System, version 2 (DCS.v2) have proposed a protocol that involves the distribution of a session key by a trusted server to a principal with whom it will communicate. The p... 详细信息
来源: 评论