咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 6 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 信息与通信工程
    • 3 篇 测绘科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 16 篇 理学
    • 10 篇 数学
    • 10 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 8 篇 医学
    • 8 篇 临床医学
  • 1 篇 军事学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 30 篇 image coding
  • 28 篇 encryption
  • 8 篇 cryptography
  • 7 篇 data compression
  • 7 篇 streaming media
  • 7 篇 discrete cosine ...
  • 6 篇 image encryption
  • 6 篇 psnr
  • 6 篇 image compressio...
  • 5 篇 transform coding
  • 5 篇 video compressio...
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 4 篇 algorithm design...
  • 3 篇 data security
  • 3 篇 simulation
  • 3 篇 videos
  • 3 篇 chaotic communic...
  • 3 篇 dna
  • 3 篇 arithmetic codin...

机构

  • 2 篇 college of mathe...
  • 2 篇 college of intel...
  • 1 篇 communication nc...
  • 1 篇 college of compu...
  • 1 篇 chongqing univ c...
  • 1 篇 kocaeli universi...
  • 1 篇 koneru lakshmaia...
  • 1 篇 faculty of itee ...
  • 1 篇 shinshu univ fac...
  • 1 篇 norwegian inform...
  • 1 篇 zhenjiang waterc...
  • 1 篇 department of co...
  • 1 篇 zhenjiang waterc...
  • 1 篇 prince sultan un...
  • 1 篇 research institu...
  • 1 篇 school of comput...
  • 1 篇 indian inst tech...
  • 1 篇 telkom engineeri...
  • 1 篇 universiti tekno...
  • 1 篇 univ calif san d...

作者

  • 2 篇 habibah hashim
  • 2 篇 vijaya santhi gu...
  • 2 篇 tanaka k
  • 2 篇 shangzhu jin
  • 2 篇 birendra biswal
  • 2 篇 jun peng
  • 2 篇 prabhakar telaga...
  • 1 篇 lukin vladimir
  • 1 篇 kuo c. -c. jay
  • 1 篇 sharma v. thanka...
  • 1 篇 anastasiia voite...
  • 1 篇 makarichev vikto...
  • 1 篇 w. puech
  • 1 篇 di xiao
  • 1 篇 kammoun fahmi
  • 1 篇 astola jaakko t.
  • 1 篇 li hengjian wang...
  • 1 篇 ahmet çağrı bağb...
  • 1 篇 abhimanyu atri
  • 1 篇 bartolini f

语言

  • 58 篇 英文
  • 1 篇 其他
检索条件"任意字段=Conference on Mathematics of Data/Image Coding, Compression, and Encryption with Applications XII"
59 条 记 录,以下是21-30 订阅
排序:
Complexity Reduction in DAT-Based image Processing
Complexity Reduction in DAT-Based Image Processing
收藏 引用
International Scientific and Technical conference on Integrated Computer Technologies in Mechanical Engineering - Synergetic Engineering (ICTM)
作者: Makarichev, Viktor Lukin, Vladimir Brysina, Iryna Natl Aerosp Univ KhAI Chkalov St 17 UA-61070 Kharkiv Ukraine
The atomic functions-based image processing system (AFIPS) is based on discrete atomic transform (DAT). It provides a combination of image encryption and compression features with a machine learning-oriented data form... 详细信息
来源: 评论
Authentication and access control in the JPEG 2000 compressed domain
Authentication and access control in the JPEG 2000 compresse...
收藏 引用
conference on applications of Digital image Processing XXIV
作者: Grosbois, R Gerbelot, P Ebrahimi, T Swiss Fed Inst Technol Signal Proc Lab CH-1015 Lausanne Switzerland
Transmission and exchange of digital images with friends and customers is become a very simple task thanks to the development of the communication networks and the tools built around them. Unfortunately, such operatio... 详细信息
来源: 评论
Bit plane encoding and encryption
收藏 引用
2nd International conference on Pattern Recognition and Machine Intelligence
作者: Yekkala, Anil Madhavan, C. E. Veni Philips Elect India Ltd Bangalore Karnataka India Indian Inst Sci Bangalore Karnataka India
The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand and also tele-medicine has created a great need for multimedia security. One of the important requirements f... 详细信息
来源: 评论
compression of encrypted three-dimensional objects using digital holography
Compression of encrypted three-dimensional objects using dig...
收藏 引用
Opto-Ireland 2005 conference
作者: Naughton, TJ Javidi, B Natl Univ Ireland Maynooth Dept Comp Sci Maynooth Kildare Ireland
We present the results of applying data compression techniques to encrypted three-dimensional objects. The objects are captured using phase-shift digital holography and encrypted using a random phase mask in the Fresn... 详细信息
来源: 评论
Grayscale image compression and encryption Based on Format Conversion
Grayscale Image Compression and Encryption Based on Format C...
收藏 引用
2nd International conference on Information Technology and Management Innovation (ICITMI 2013)
作者: Wang, Fangchao Bai, Sen Zhao, Bo He, Nan Zhenjiang Watercraft Coll Dept Commun Zhenjiang 212000 Peoples R China Chongqing Commun Inst Image Commun Lab Chongqing 404100 Peoples R China Zhenjiang Watercraft Coll Observat Dept Zhenjiang 212000 Peoples R China
In this paper, we describe a novel encryption algorithm, which converts a greyscale image into a colored JPEG image. Firstly, it creates MCU (Minimum coding Unit) of the colored JPEG image from the DU (data Unit) of t... 详细信息
来源: 评论
Proceedings - DCC 2022: 2022 data compression conference
Proceedings - DCC 2022: 2022 Data Compression Conference
收藏 引用
2022 data compression conference, DCC 2022
The proceedings contain 86 papers. The topics discussed include: synergies between in-loop and out-of-loop mapping for HDR-PQ content;beyond keypoint coding: temporal evolution inference with compact feature represent...
来源: 评论
Multi-Level Secured encryption Technique Using Enhanced Fractal image Watermarking
Multi-Level Secured Encryption Technique Using Enhanced Frac...
收藏 引用
2018 International conference on Inventive Research in Computing applications, ICIRCA 2018
作者: Kaur, Gurjeet Kumar Verma, Shiv Department of CSE Chandigarh University GharuanPunjab India
With the rapid enhancement of internet the digital multimedia such as images, audio, video are easily reproduced and distributed. The main issue of securing the data and information is born from the dependency upon th... 详细信息
来源: 评论
AN IMPROVED DC RECOVERY METHOD FROM AC COEFFICIENTS OF DCT-TRANSFORMED imageS
AN IMPROVED DC RECOVERY METHOD FROM AC COEFFICIENTS OF DCT-T...
收藏 引用
IEEE International conference on image Processing
作者: Li, Shujun Ahmad, Junaid Jameel Saupe, Dietmar Kuo, C. -C. Jay Univ Konstanz Dept Comp & Informat Sci D-7750 Constance Germany Univ Southern Calif Ming Hsieh Dept EE Los Angeles CA USA
Motivated by the work of Uehara et al. [1], an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds applications in cryptanalysis of selec... 详细信息
来源: 评论
A Novel image encryption and Decoding Approach Based on DNA coding and Arnold's Transformation for IoT applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
2024 International Telecommunications conference, ITC-Egypt 2024
作者: Shaltout, Nawal Abd El-Latif, Ahmed A. Al-Adrousy, Waleed Hammad, Mohamed Ateya, Abdelhamied A. Elmougy, Samir Mansoura University Faculty of Computers and Information Department of Computer Science Mansoura35516 Egypt Prince Sultan University EIAS Data Science Lab College of Computer and Information Sciences Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science 32511 Egypt Menoufia University Faculty of Computers and Information Department of Information Technology Shibin El Kom32511 Egypt Zagazig University Department of Electronics and Communications Engineering Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论
Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients
International Conference on Multimedia Computing and Systems...
收藏 引用
International conference on Multimedia Computing and Systems -Proceedings 1999年 2卷 908-912页
作者: Wu, Xiaolin Moo, Peter W. Univ of Western Ontario London Canada
As the internet and multimedia systems grow in size and popularity, compression and encryption of image and video data are becoming increasingly important. However, independent compression and encryption is too slow f... 详细信息
来源: 评论