咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 5 册 图书
  • 4 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 93 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 电气工程
    • 11 篇 信息与通信工程
    • 10 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 测绘科学与技术
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物工程
  • 33 篇 理学
    • 23 篇 数学
    • 22 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学
  • 14 篇 医学
    • 14 篇 临床医学
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 军事学

主题

  • 35 篇 image coding
  • 28 篇 encryption
  • 11 篇 data compression
  • 11 篇 image compressio...
  • 10 篇 cryptography
  • 8 篇 streaming media
  • 7 篇 psnr
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 5 篇 image reconstruc...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 videos
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 pixel
  • 3 篇 chaotic communic...

机构

  • 4 篇 university of fl...
  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 2 篇 univ florida dep...
  • 1 篇 communication nc...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 henan joint inte...
  • 1 篇 zhenjiang waterc...
  • 1 篇 research center ...

作者

  • 4 篇 mark steven schm...
  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 schmalz mark s.
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 zhao rc
  • 1 篇 kuo c. -c. jay
  • 1 篇 guo j
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 mitrea m.
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 yao m

语言

  • 92 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption VI, with Applications"
93 条 记 录,以下是91-100 订阅
排序:
Enhanced image Concealment: Leveraging LSB and Brotli compression
Enhanced Image Concealment: Leveraging LSB and Brotli Compre...
收藏 引用
Advancement in Technology (ICONAT), International conference for
作者: Shaik Yacoob vikrant Sabnis Jay Kumar Jain Mansarovar Global University Bhopal MP India Department of Computer Science Faculty of Engineering and Technology Mansarovar Global University Bhopal MP India Department of Mathematics Bioinformatics and Computer Applications Maulana Azad National Institute of Technology Bhopal MP India
Steganography a cryptographic technique enables the concealment of confidential data within multimedia files like images and videos. This method facilitates the exchange of encrypted information through unconventional... 详细信息
来源: 评论
An encryption Method of Multiple images and Multiple Region of Interest Based on DNA Sequence and Chaotic System
An Encryption Method of Multiple Images and Multiple Region ...
收藏 引用
IEEE conference on Industrial Electronics and applications (ICIEA)
作者: Jun Peng Ke Xu Qingxia Li Shangzhu Jin Yingxu Wang College of Mathematics Physics and Data Science Chongqing University of Science and Technology Chongqing China Chongqing Sino-German Future Factory Research Institute Chongqing China College of Intelligent Technology and Engineering Chongqing University of Science and Technology Chongqing China Information Office Chongqing University of Science and Technology Chongqing China Schulich School of Engineering and Hotchkiss Brain Institute University of Calgary Alberta Canada
Most of the existing image encryption methods based on the region of interest (ROI) use traditional methods to manually screen regions, which are notoriously difficult to implement serialized and cannot handle multipl... 详细信息
来源: 评论
Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement applications
Towards Understanding and Detecting File Types in Encrypted ...
收藏 引用
IEEE International conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Adam L. Hooker Wenjian Huang Shalini Kapali Kurumathur Nishant vishwamitra Kim-Kwang Raymond Choo Department of Electrical and Computer Engineering University of Texas at San Antonio Department of Information Systems and Cyber Security University of Texas at San Antonio
The (ab)use of encryption and compression in hiding illegal digital content complicates efforts by law enforcement agencies (LEAs) to procure evidence to support the elements of proof required in criminal prosecution.... 详细信息
来源: 评论