咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 31 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 41 篇 电气工程
    • 41 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 21 篇 信息与通信工程
    • 4 篇 机械工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
  • 62 篇 理学
    • 54 篇 物理学
    • 4 篇 生物学
    • 3 篇 系统科学
  • 45 篇 医学
    • 45 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 19 篇 information syst...
  • 19 篇 computer communi...
  • 16 篇 artificial intel...
  • 14 篇 algorithm analys...
  • 12 篇 software enginee...
  • 12 篇 information stor...
  • 10 篇 steganography
  • 7 篇 security
  • 7 篇 mobile communica...
  • 7 篇 image processing...
  • 5 篇 multimedia
  • 5 篇 multimedia commu...
  • 5 篇 steganalysis
  • 5 篇 mobile handsets
  • 4 篇 image enhancemen...
  • 4 篇 face recognition
  • 4 篇 database managem...
  • 4 篇 decoding
  • 4 篇 cloud computing
  • 3 篇 jpeg

机构

  • 10 篇 information syst...
  • 7 篇 king saud univer...
  • 4 篇 univ texas san a...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 cuny coll staten...
  • 3 篇 tufts univ dept ...
  • 3 篇 faculty of compu...
  • 3 篇 advanced informa...
  • 2 篇 htw berlin d-103...
  • 2 篇 haw hamburg dept...
  • 2 篇 international is...
  • 2 篇 vsb – technical ...
  • 2 篇 international sc...
  • 2 篇 free univ berlin...
  • 2 篇 univ s alabama m...
  • 2 篇 amrita school of...
  • 2 篇 tufts univ dept ...
  • 2 篇 faculty of infor...
  • 2 篇 univ s alabama d...

作者

  • 18 篇 eyas el-qawasmeh
  • 10 篇 agaian sos s.
  • 8 篇 azizah abd manaf
  • 6 篇 jasni mohamad za...
  • 5 篇 creutzburg reine...
  • 5 篇 collins james c.
  • 5 篇 agaian sos
  • 5 篇 xiong huang
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 mazdak zamani
  • 3 篇 kroeger knut
  • 3 篇 feria erlan h.
  • 3 篇 panetta karen
  • 3 篇 tai-hoon kim

语言

  • 157 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing, Security, and Applications 2011"
160 条 记 录,以下是1-10 订阅
排序:
mobile multimedia/image processing, security, and applications 2011
Mobile Multimedia/Image Processing, Security, and Applicatio...
收藏 引用
mobile multimedia/image processing, security, and applications 2011
The proceedings contain 40 papers. The topics discussed include: video scrambling for privacy protection in video surveillance: recent results and validation framework;ensuring security of H.264 videos by using waterm...
来源: 评论
eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices
eBiometrics: an enhanced multi-biometrics authentication tec...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Kuseler, Torben Lami, Ihsan Jassim, Sabah Sellahewa, Harin Univ Buckingham Dept Appl Comp Buckingham MK18 1EG England
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as image capture, Location applications, and Biometric authentication such as Fingerprint veri... 详细信息
来源: 评论
iPhone forensics - a practical overview with certain commercial software
iPhone forensics - a practical overview with certain commerc...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Hoene, Thomas Creutzburg, Reiner Brandenburg Univ Appl Sci Dept Informat & Media D-14770 Brandenburg Germany
The aim of this article is to give a practical overview of certain commercial software for investigation of the new iPhone 4. It is demonstrated how important data stored in the iPhone are investigated. Different case... 详细信息
来源: 评论
Examination of mobile phones in a university forensic lab environment
Examination of mobile phones in a university forensic lab en...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Luttenberger, Silas Kroeger, Knut Creutzburg, Reiner Brandenburg Univ Appl Sci Dept Informat & Media D-14770 Brandenburg Germany
The aim of this article is to show forensic investigation methods for mobile phones to students in a university forensic lab environment. Students have to learn the usefulness of forensic procedures to ensure evidence... 详细信息
来源: 评论
System for Non-Disruptive High Capacity Indexed Data Embedding and Recovery Using multimedia Signal Covers
System for Non-Disruptive High Capacity Indexed Data Embeddi...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia te... 详细信息
来源: 评论
Accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements
Accuracy, security, and processing time comparisons of biome...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Alsharif, Salim El-Saba, Aed Jagapathi, Rajendarreddy Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Beside... 详细信息
来源: 评论
Mean field game theoretic approach for security in mobile ad-hoc networks
Mean field game theoretic approach for security in mobile ad...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wang, Yanwei Tang, Helen Yu, F. Richard Huang, Minyi Carleton Univ Dept Syst & Comp Eng Ottawa ON K1S 5B6 Canada Defence R&D Canada Ottawa Ottawa ON Canada Carleton Univ Sch Math & Stat Ottawa ON K1S 5B6 Canada
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: a... 详细信息
来源: 评论
Ensuring security of H.264 videos by using watermarking
Ensuring security of H.264 videos by using watermarking
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2011
作者: Chaumont, Marc Univ Nimes F-30000 Nimes France
Watermarking is known to be a very difficult task. Robustness, Distortion, Payload, security, Complexity are many constraints to deal with. When applied to a video stream, the difficulty seems to be growing in compari... 详细信息
来源: 评论
On privacy-protected outsourced processing for mobile multimedia
On privacy-protected outsourced processing for mobile multim...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Svendsen, Tristen Wang, Zhaohong Calif State Univ Chico Elect & Comp Engn Dept Chico CA 95929 USA
mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the custom... 详细信息
来源: 评论
Adjunctive Numerical Relation Codes in multimedia Signal Covers
Adjunctive Numerical Relation Codes in Multimedia Signal Cov...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
This paper introduces a new redundant number system, the adjunctive numerical relation (ANR) codes, which offer improvements over other well known systems such as the Fibonacci, Lucas, and the Prime number systems whe... 详细信息
来源: 评论