咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 5 册 图书
  • 4 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 93 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 电气工程
    • 11 篇 信息与通信工程
    • 10 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 测绘科学与技术
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物工程
  • 33 篇 理学
    • 23 篇 数学
    • 22 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学
  • 14 篇 医学
    • 14 篇 临床医学
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 军事学

主题

  • 35 篇 image coding
  • 28 篇 encryption
  • 11 篇 data compression
  • 11 篇 image compressio...
  • 10 篇 cryptography
  • 8 篇 streaming media
  • 7 篇 psnr
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 5 篇 image reconstruc...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 videos
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 pixel
  • 3 篇 chaotic communic...

机构

  • 4 篇 university of fl...
  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 2 篇 univ florida dep...
  • 1 篇 communication nc...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 henan joint inte...
  • 1 篇 zhenjiang waterc...
  • 1 篇 research center ...

作者

  • 4 篇 mark steven schm...
  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 schmalz mark s.
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 zhao rc
  • 1 篇 kuo c. -c. jay
  • 1 篇 guo j
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 mitrea m.
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 yao m

语言

  • 92 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption VI, with Applications"
93 条 记 录,以下是21-30 订阅
排序:
encryption of Walsh Hadamard Transform applied images with the AES encryption algorithm
Encryption of Walsh Hadamard Transform applied images with t...
收藏 引用
IEEE Signal Processing and Communications applications (SIU)
作者: Meltem Kurt Pehli̇vanoğlu Nevcihan Duru Kocaeli Universitesi Kocaeli TR
Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this stud... 详细信息
来源: 评论
Watermarking and encryption in medical image through roi-lossless compression
Watermarking and encryption in medical image through roi-los...
收藏 引用
International conference on Communications and Signal Processing
作者: S. Nithya K. Amudha Electronics and Communication Department Anna University Tiruchengode India
The transfer of medical data is too done securely over the community network and manipulated in an effective manner. For the enhancement of safety and verification of medical records, watermarking method is used for m... 详细信息
来源: 评论
Hardware implementation of novel image compression-encryption system on a FPGA
Hardware implementation of novel image compression-encryptio...
收藏 引用
International conference on Electrical and Electronics Engineering, ELECO
作者: Ahmet Çağrı Bağbaba Berna Örs Istanbul Technical University Turkey
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this... 详细信息
来源: 评论
A very efficient encryption scheme for the H.264/AVC CODEC adopted in Intra prediction mode
A very efficient encryption scheme for the H.264/AVC CODEC a...
收藏 引用
International image Processing, applications and Systems conference (IPAS)
作者: N. Khlif T. Damak F. Kammoun N. Masmoudi Electrical department University of Sfax Tunisia
The concept of data compression in CODECs is based on pixel prediction to avoid redundancy. For the security of data compressed with the H.264/AVC CODEC, researchers are thinking to selective encryption. This paper pr... 详细信息
来源: 评论
compression and encryption technique on securing TFTP packet
Compression and encryption technique on securing TFTP packet
收藏 引用
International conference on Computer applications and Industrial Electronics (ICCAIE)
作者: Nur Nabila Mohamed Habibah Hashim Yusnani Mohd Yussoff Mohd Anuar Mat Isa Syed Farid Syed Adnan Faculty of Electrical Engineering University Teknologi MARA Shah Alam Selangor Malaysia Universiti Teknologi MARA Shah Alam Selangor MY
data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving a... 详细信息
来源: 评论
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Implementation of steganography using LSB with encrypted and...
收藏 引用
International conference on Computer, Control, Informatics and Its applications (IC3INA)
作者: Made Sumarsana Adi Putra Gelar Budiman Ledya Novamizanti Telkom Engineering School Telkom University Bandung Indonesia
The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in stegano... 详细信息
来源: 评论
A low computational method of secure video streaming in mobile system
A low computational method of secure video streaming in mobi...
收藏 引用
International conference on Computer applications and Industrial Electronics (ICCAIE)
作者: Mohammed A. Saleh Habibah Hashim Nooritawati Md. Tahir Faculty Of Electrical Engineering Universiti Teknologi MARA Shah Alam Selangor Malaysia
Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be com... 详细信息
来源: 评论
Grayscale image compression and encryption Based on Format Conversion
Grayscale Image Compression and Encryption Based on Format C...
收藏 引用
2nd International conference on Information Technology and Management Innovation (ICITMI 2013)
作者: Wang, Fangchao Bai, Sen Zhao, Bo He, Nan Zhenjiang Watercraft Coll Dept Commun Zhenjiang 212000 Peoples R China Chongqing Commun Inst Image Commun Lab Chongqing 404100 Peoples R China Zhenjiang Watercraft Coll Observat Dept Zhenjiang 212000 Peoples R China
In this paper, we describe a novel encryption algorithm, which converts a greyscale image into a colored JPEG image. Firstly, it creates MCU (Minimum coding Unit) of the colored JPEG image from the DU (data Unit) of t... 详细信息
来源: 评论
A Novel Algorithm for image compression and Pattern Matching
A Novel Algorithm for Image Compression and Pattern Matching
收藏 引用
International conference on Advances in Computing and Communications (ICACC)
作者: Shamna P Tripti C Paul Augustine Department of Computer Science Rajagiri School of Engineering & Technology Kochi 39 Kerala India
The development in communication and use of multimedia applications has created a remarkable demand for robust ways to store and transmit large databases of images. The current communication system demands compression... 详细信息
来源: 评论
Reversible data hiding technique for stream ciphered and wavelet compressed image
Reversible data hiding technique for stream ciphered and wav...
收藏 引用
International conference on Pattern Recognition, Informatics and Medical Engineering
作者: S. Imaculate Rosaline C. Rengarajaswamy Department of Electronics and Communication Engineering Oxford Engineering College Department of Electronics and Communication Engineering Oxford Engineering College India
Reversible data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securin... 详细信息
来源: 评论