咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 6 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 信息与通信工程
    • 3 篇 测绘科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 16 篇 理学
    • 10 篇 数学
    • 10 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 8 篇 医学
    • 8 篇 临床医学
  • 1 篇 军事学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 30 篇 image coding
  • 28 篇 encryption
  • 8 篇 cryptography
  • 7 篇 data compression
  • 7 篇 streaming media
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 6 篇 psnr
  • 6 篇 image compressio...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 videos
  • 3 篇 chaotic communic...
  • 3 篇 dna
  • 3 篇 arithmetic codin...

机构

  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 1 篇 communication nc...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 zhenjiang waterc...
  • 1 篇 prince sultan un...
  • 1 篇 research institu...
  • 1 篇 school of comput...
  • 1 篇 indian inst tech...
  • 1 篇 telkom engineeri...
  • 1 篇 universiti tekno...
  • 1 篇 univ calif san d...

作者

  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 kuo c. -c. jay
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 kammoun fahmi
  • 1 篇 astola jaakko t.
  • 1 篇 li hengjian wang...
  • 1 篇 ahmet çağrı bağb...
  • 1 篇 abhimanyu atri
  • 1 篇 bartolini f

语言

  • 58 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption with Applications XII"
59 条 记 录,以下是1-10 订阅
排序:
Complexity Reduction in DAT-Based image Processing
Complexity Reduction in DAT-Based Image Processing
收藏 引用
International Scientific and Technical conference on Integrated Computer Technologies in Mechanical Engineering - Synergetic Engineering (ICTM)
作者: Makarichev, Viktor Lukin, Vladimir Brysina, Iryna Natl Aerosp Univ KhAI Chkalov St 17 UA-61070 Kharkiv Ukraine
The atomic functions-based image processing system (AFIPS) is based on discrete atomic transform (DAT). It provides a combination of image encryption and compression features with a machine learning-oriented data form... 详细信息
来源: 评论
A Novel image encryption and Decoding Approach Based on DNA coding and Arnold's Transformation for IoT applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
2024 International Telecommunications conference, ITC-Egypt 2024
作者: Shaltout, Nawal Abd El-Latif, Ahmed A. Al-Adrousy, Waleed Hammad, Mohamed Ateya, Abdelhamied A. Elmougy, Samir Mansoura University Faculty of Computers and Information Department of Computer Science Mansoura35516 Egypt Prince Sultan University EIAS Data Science Lab College of Computer and Information Sciences Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science 32511 Egypt Menoufia University Faculty of Computers and Information Department of Information Technology Shibin El Kom32511 Egypt Zagazig University Department of Electronics and Communications Engineering Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论
Reversible data Hiding in Encrypted image Based on Block and Huffman Encoding  2nd
Reversible Data Hiding in Encrypted Image Based on Block and...
收藏 引用
2nd International conference on Security and Information Technologies with AI, Internet Computing and Big-data applications, SITAIBA 2023
作者: Yang, Cheng-Hsing Weng, Chi-Yao Huang, Bo-Han Huang, Wei-Qing Department of Computer Science and Artificial Intelligence National Pingtung University Pingtung900 Taiwan Department of Computer Science and Information Engineering National Chiayi University Chiayi600 Taiwan
The paper presents a reversible data hiding method with image compression consisting of Huffman coding and block encrypted. In the proposed approach, the image is used to compressed for generating the specified space ... 详细信息
来源: 评论
Privacy-Assured and Multi-Prior Recovered Compressed Sensing for image compression-encryption applications
Privacy-Assured and Multi-Prior Recovered Compressed Sensing...
收藏 引用
data compression conference (DCC)
作者: Huang, Hui Xiao, Di Li, Min Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China
Compressed sensing (CS), a popular signal processing technique, can achieve compression and encryption simultaneously. Therefore, it has extension applications in various fields. However, CS is vulnerable to cryptogra... 详细信息
来源: 评论
Remote Sensing image encryption Algorithm Based on Chaotic System and DNA Sequence
Remote Sensing Image Encryption Algorithm Based on Chaotic S...
收藏 引用
IEEE conference on Industrial Electronics and applications (ICIEA)
作者: Jun Peng Yiyi Luo Shangzhu Jin Biao Mou Chenxi Li Wei Chen College of Mathematics Physics and Data Science Chongqing University of Science and Technology Chongqing China Research Institute of Intelligent Mathematics and Autonomous AI (RI-IM.AI*) CQUST Chongqing China College of Intelligent Technology and Engineering Chongqing University of Science and Technology Chongqing China Informatization Office Chongqing University of Science and Technology Chongqing China
Currently, the security of satellite remote sensing images is a research hotspot of information security, most of the image encryption algorithms are the whole image for encryption, but only a part of the data in a pi... 详细信息
来源: 评论
Enhancing data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and compression Algortihm
Enhancing Data Security and Efficiency: A Hybrid Cryptograph...
收藏 引用
Intelligent data Communication Technologies and Internet of Things (IDCIoT), International conference on
作者: Akash Badhan Simarjit Singh Malhi School of Computer Science and Engineering Lovely Professional University Phagwara India
The paper presents a novel approach for enhancing data security and efficiency using a hybrid cryptography model that is Advanced encryption Standard (AES) and Elliptic Curve Cryptography (ECC) with steganography and ... 详细信息
来源: 评论
Efficient Encodings for Privacy-Preserving data Storage and Transmission
Efficient Encodings for Privacy-Preserving Data Storage and ...
收藏 引用
IEEE International conference on Big data
作者: Arghya Kusum Das M. Oguzhan Kulekci Sharma V. Thankachan Department of Computer Science University of Alaska Fairbanks Fairbanks AL USA Department of Computer Science Indiana University Bloomington Bloomington IN USA Department of Computer Science North Carolina State University Raleigh NC USA
Secure and privacy-preserving storage of digital data typically requires encrypting it, where the retrieval will man-date its decryption. The overhead of these encryption/decryption requirements introduce some latency... 详细信息
来源: 评论
Proceedings - DCC 2022: 2022 data compression conference
Proceedings - DCC 2022: 2022 Data Compression Conference
收藏 引用
2022 data compression conference, DCC 2022
The proceedings contain 86 papers. The topics discussed include: synergies between in-loop and out-of-loop mapping for HDR-PQ content;beyond keypoint coding: temporal evolution inference with compact feature represent...
来源: 评论
A Novel image encryption and Decoding Approach Based on DNA coding and Arnold's Transformation for IoT applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
Telecommunications conference (ITC-Egypt), International
作者: Nawal Shaltout Ahmed A. Abd El-Latif Waleed Al-Adrousy Mohamed Hammad Abdelhamied A. Ateya Samir Elmougy Department of Computer Science Faculty of Computers and Information Mansoura University Mansoura Egypt EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Egypt Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom Egypt Department of Electronics and Communications Engineering Zagazig University Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论
Video motion and Decryption. A Comparative Study for Compressed Videos
Video motion and Decryption. A Comparative Study for Compres...
收藏 引用
Workshops on image Processing Theory, Tools and applications, IPTA
作者: Anastasiia Voitenko Mourad Oussalah Faculty of ITEE Centre for Machine Vision and Signal Processing University of Oulu Oulu Finland
Transmission of video data is known to cause high privacy leak risk due to effect of data compression rates and disparate standards, which challenge encryption/decryption methods. This paper presents a comparison of A... 详细信息
来源: 评论