咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 5 册 图书
  • 4 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 93 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 电气工程
    • 11 篇 信息与通信工程
    • 10 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 测绘科学与技术
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物工程
  • 33 篇 理学
    • 23 篇 数学
    • 22 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学
  • 14 篇 医学
    • 14 篇 临床医学
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 军事学

主题

  • 35 篇 image coding
  • 28 篇 encryption
  • 11 篇 data compression
  • 11 篇 image compressio...
  • 10 篇 cryptography
  • 8 篇 streaming media
  • 7 篇 psnr
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 5 篇 image reconstruc...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 videos
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 pixel
  • 3 篇 chaotic communic...

机构

  • 4 篇 university of fl...
  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 2 篇 univ florida dep...
  • 1 篇 communication nc...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 henan joint inte...
  • 1 篇 zhenjiang waterc...
  • 1 篇 research center ...

作者

  • 4 篇 mark steven schm...
  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 schmalz mark s.
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 zhao rc
  • 1 篇 kuo c. -c. jay
  • 1 篇 guo j
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 mitrea m.
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 yao m

语言

  • 92 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption VI, with Applications"
93 条 记 录,以下是81-90 订阅
排序:
video motion and Decryption. A Comparative Study for Compressed videos
Video motion and Decryption. A Comparative Study for Compres...
收藏 引用
Workshops on image Processing Theory, Tools and applications, IPTA
作者: Anastasiia Voitenko Mourad Oussalah Faculty of ITEE Centre for Machine Vision and Signal Processing University of Oulu Oulu Finland
Transmission of video data is known to cause high privacy leak risk due to effect of data compression rates and disparate standards, which challenge encryption/decryption methods. This paper presents a comparison of A... 详细信息
来源: 评论
A Novel image encryption and Decoding Approach Based on DNA coding and Arnold's Transformation for IoT applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
Telecommunications conference (ITC-Egypt), International
作者: Nawal Shaltout Ahmed A. Abd El-Latif Waleed Al-Adrousy Mohamed Hammad Abdelhamied A. Ateya Samir Elmougy Department of Computer Science Faculty of Computers and Information Mansoura University Mansoura Egypt EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Egypt Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom Egypt Department of Electronics and Communications Engineering Zagazig University Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Implementation of steganography using LSB with encrypted and...
收藏 引用
International conference on Computer, Control, Informatics and Its applications (IC3INA)
作者: Made Sumarsana Adi Putra Gelar Budiman Ledya Novamizanti Telkom Engineering School Telkom University Bandung Indonesia
The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in stegano... 详细信息
来源: 评论
visual security assessment for video encryption
Visual security assessment for video encryption
收藏 引用
International conference on Communications and Networking in China (CHINACOM)
作者: Ye Yao Zhengquan Xu Wei Li College of Computer & Information Engineering Zhejiang Gongshang University Hangzhou China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University of China Wuhan China
video data security is very important for multimedia applications, such as video surveillance and real time videoconference. Although many video encryption methods have been reported, no systematic visual security ass... 详细信息
来源: 评论
Sparse natural image statistics and their applications to colorization and compression
Sparse natural image statistics and their applications to co...
收藏 引用
IEEE International conference on image Processing
作者: Alexander Balinsky Nassir Mohammad School of Mathematics Cardiff University UK Hewlett Packard Laboratories Bristol UK
Statistical analysis of natural luminance and colour images have shown to display non-Gaussian distributions. We review a recent result on the non-linear sparse filter response distribution observed in, and illustrate... 详细信息
来源: 评论
Transparent and perceptually enhanced JPEG image encryption
Transparent and perceptually enhanced JPEG image encryption
收藏 引用
International conference on Digital Signal Processing (DSP)
作者: Bian Yang Chong-Qing Zhou Christoph Busch Xia-Mu Niu Department of Computer Science and Technology Harbin Institute of Technology China Norwegian Information Security Laboratory Gjovik University College Norway
In many applications encryption/decryption of compressed images or videos is desired to be transparent to the compression decoder to maintain the file format, file size and content-relevant functionalities. We propose... 详细信息
来源: 评论
DICOM image compression using Bilinear interpolation
DICOM image compression using Bilinear interpolation
收藏 引用
IEEE EMBS International conference on Information Technology applications in Biomedicine (ITAB)
作者: G. Uma Vetri Selvi R. Nadarajan Department of Mathematics & Computer Applications Coimbatore India
In this paper, we propose a new lossy image compression algorithm for DICOM ( Digital Imaging and Communications in Medicine) images using Bilinear interpolation. This method presents a technique for classification of... 详细信息
来源: 评论
A low computational method of secure video streaming in mobile system
A low computational method of secure video streaming in mobi...
收藏 引用
International conference on Computer applications and Industrial Electronics (ICCAIE)
作者: Mohammed A. Saleh Habibah Hashim Nooritawati Md. Tahir Faculty Of Electrical Engineering Universiti Teknologi MARA Shah Alam Selangor Malaysia
Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be com... 详细信息
来源: 评论
compression-encryption Based Efficient Dual image Watermarking for e-Healthcare applications
Compression-Encryption Based Efficient Dual Image Watermarki...
收藏 引用
Electronics, Communication and Signal Processing (ICECSP), International conference on
作者: Gautam Malhotra Abhimanyu Atri Jyoti Rani Ashima Anand Computer Science and Engineering Thapar Institute of Engineering and Technology
The requirement to protect the authenticity and accuracy of images motivates the implementation of water-marking on these images. Any alteration or interference with medical images might lead to erroneous diagnosis or... 详细信息
来源: 评论
A Secure image Steganography Using Improved Lsb Technique And vigenere Cipher Algorithm
A Secure Image Steganography Using Improved Lsb Technique An...
收藏 引用
Artificial Intelligence and Smart Systems (ICAIS), International conference on
作者: Lasya Voleti R M Balajee Siva Koteswararao Vallepu Karthik Bayoju Devireddy Srinivas Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur Andhra Pradesh India
Steganography is the practise of concealing information in another type. Many different carrier file formats may be used, but digital images are most popular. This involved with the stronger and weaker image hiding, f... 详细信息
来源: 评论