咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 5 册 图书
  • 4 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 93 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 电气工程
    • 11 篇 信息与通信工程
    • 10 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 测绘科学与技术
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物工程
  • 33 篇 理学
    • 23 篇 数学
    • 22 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学
  • 14 篇 医学
    • 14 篇 临床医学
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 军事学

主题

  • 35 篇 image coding
  • 28 篇 encryption
  • 11 篇 data compression
  • 11 篇 image compressio...
  • 10 篇 cryptography
  • 8 篇 streaming media
  • 7 篇 psnr
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 5 篇 image reconstruc...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 videos
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 pixel
  • 3 篇 chaotic communic...

机构

  • 4 篇 university of fl...
  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 2 篇 univ florida dep...
  • 1 篇 communication nc...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 henan joint inte...
  • 1 篇 zhenjiang waterc...
  • 1 篇 research center ...

作者

  • 4 篇 mark steven schm...
  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 schmalz mark s.
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 zhao rc
  • 1 篇 kuo c. -c. jay
  • 1 篇 guo j
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 mitrea m.
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 yao m

语言

  • 92 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption VI, with Applications"
93 条 记 录,以下是51-60 订阅
排序:
Unpuzzling Puzzle (analysis of a video encryption algorithm)
Unpuzzling Puzzle (analysis of a video encryption algorithm)
收藏 引用
International conference on Advanced Information Networking and applications (AINA)
作者: M. Stanek L. Stanekova Department of Computer Science Comenius University Bratislava Slovakia Department of Mathematics Slovak University of Technology Bratislava Slovakia
We analyze recently proposed encryption algorithm Puzzle, aimed at efficient (real time) encryption of video streams. We show some weaknesses in the generation of components used for encryption. Moreover, we present a... 详细信息
来源: 评论
Proceedings of SPIE mathematics of data/image coding, compression, and encryption viII, with applications
Proceedings of SPIE Mathematics of Data/Image Coding, Compre...
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
The proceedings contain 21 papers. The topics discussed include: a cryptanalysis procedure of the data encryption standard;an adaptive watermarking scheme in the DCT domain;robust video watermarking using additional w... 详细信息
来源: 评论
A cryptanalysis procedure of the data encryption standard
A cryptanalysis procedure of the data encryption standard
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
作者: Silva G., victor Manuel CIDETEC IPN Avenida Te #950 C.P. 08400 Mexico D.F. Mexico
In this paper an attack strategy on the data encryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The atta... 详细信息
来源: 评论
On encryption-compression tradeoff of pre/post-filtered images
On encryption-compression tradeoff of pre/post-filtered imag...
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
作者: Gurijala, Aparna Khayam, Syed A. Radha, Hayder Deller Jr., J.R. Department of Electrical and Computer Engineering 2120 Engineering Building Michigan State University East Lansing MI 48824
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be... 详细信息
来源: 评论
Double random phase spread spectrum spread space technique for secure parallel optical multiplexing with individual encryption key
Double random phase spread spectrum spread space technique f...
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
作者: Hennelly, B.M. Javidi, B. Sheridan, J.T. Department of Electronic and Electrical Engineering Faculty of Engineering and Architecture University College Dublin Belfield Dublin 4 Ireland Department of Electrical and Computer Engineering University of Connecticut Storrs CT 06269-2157
A number of methods have been recently proposed in the literature for the encryption of 2-D information using linear optical systems. In particular the double random phase encoding system has received widespread atten... 详细信息
来源: 评论
Fractal based techniques and their applications
Fractal based techniques and their applications
收藏 引用
作者: Lai, Cheung-Ming Hong Kong Polytechnic University (Hong Kong)
学位级别:Ph.D.
The aim of this research is to develop efficient algorithms for fractal image coding, which can be applied in digital image compression, image magnification and image denoising. Fractal image coding can provide a high... 详细信息
来源: 评论
compression of encrypted three-dimensional objects using digital holography
Compression of encrypted three-dimensional objects using dig...
收藏 引用
Opto-Ireland 2005 conference
作者: Naughton, TJ Javidi, B Natl Univ Ireland Maynooth Dept Comp Sci Maynooth Kildare Ireland
We present the results of applying data compression techniques to encrypted three-dimensional objects. The objects are captured using phase-shift digital holography and encrypted using a random phase mask in the Fresn... 详细信息
来源: 评论
Crypto-compression of medical images by selective encryption of DCT
Crypto-compression of medical images by selective encryption...
收藏 引用
European Signal Processing conference (EUSIPCO)
作者: W. Puech J. M. Rodrigues Universite de Montpellier Montpellier Languedoc-Roussillon FR Laboratoire LIRMM Université Montpellier MONTPELLIER FRANCE
The traffic of digital images has grown rapidly in the Internet. Security of image becomes important for many sectors mainly for medical applications. Nowadays, the transmission of medical images is a daily routine, e... 详细信息
来源: 评论
Proceedings - 3rd International conference on Intelligent Sensing and Information Processing, ICISIP 2005
Proceedings - 3rd International Conference on Intelligent Se...
收藏 引用
3rd International conference on Intelligent Sensing and Information Processing, ICISIP 2005
The proceedings contain 42 papers. The topics discussed include: EEG artifact reduction in VEP using 2-stage PCA and N4 analysis of alcoholics;an efficient coding method for teleconferencing and medical image sequence...
来源: 评论
Proceedings of SPIE: mathematics of data/image coding, compression, and encryption vi, with applications
Proceedings of SPIE: Mathematics of Data/Image Coding, Compr...
收藏 引用
mathematics of data/image coding, compression, and encryption vi, with applications
The proceedings contains 22 papers of SPIE : mathematics of data/image coding, compression, and encryption vi, with applications. The topics discussed include: natural language insensitive short textual string compres... 详细信息
来源: 评论