咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 31 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 41 篇 电气工程
    • 41 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 21 篇 信息与通信工程
    • 4 篇 机械工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
  • 62 篇 理学
    • 54 篇 物理学
    • 4 篇 生物学
    • 3 篇 系统科学
  • 45 篇 医学
    • 45 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 19 篇 information syst...
  • 19 篇 computer communi...
  • 16 篇 artificial intel...
  • 14 篇 algorithm analys...
  • 12 篇 software enginee...
  • 12 篇 information stor...
  • 10 篇 steganography
  • 7 篇 security
  • 7 篇 mobile communica...
  • 7 篇 image processing...
  • 5 篇 multimedia
  • 5 篇 multimedia commu...
  • 5 篇 steganalysis
  • 5 篇 mobile handsets
  • 4 篇 image enhancemen...
  • 4 篇 face recognition
  • 4 篇 database managem...
  • 4 篇 decoding
  • 4 篇 cloud computing
  • 3 篇 jpeg

机构

  • 10 篇 information syst...
  • 7 篇 king saud univer...
  • 4 篇 univ texas san a...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 cuny coll staten...
  • 3 篇 tufts univ dept ...
  • 3 篇 faculty of compu...
  • 3 篇 advanced informa...
  • 2 篇 htw berlin d-103...
  • 2 篇 haw hamburg dept...
  • 2 篇 international is...
  • 2 篇 vsb – technical ...
  • 2 篇 international sc...
  • 2 篇 free univ berlin...
  • 2 篇 univ s alabama m...
  • 2 篇 amrita school of...
  • 2 篇 tufts univ dept ...
  • 2 篇 faculty of infor...
  • 2 篇 univ s alabama d...

作者

  • 18 篇 eyas el-qawasmeh
  • 10 篇 agaian sos s.
  • 8 篇 azizah abd manaf
  • 6 篇 jasni mohamad za...
  • 5 篇 creutzburg reine...
  • 5 篇 collins james c.
  • 5 篇 agaian sos
  • 5 篇 xiong huang
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 mazdak zamani
  • 3 篇 kroeger knut
  • 3 篇 feria erlan h.
  • 3 篇 panetta karen
  • 3 篇 tai-hoon kim

语言

  • 157 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing, Security, and Applications 2011"
160 条 记 录,以下是21-30 订阅
排序:
Secure image communication for network applications
Secure image communication for network applications
收藏 引用
conference on mobile multimedia/image processing for Military and security applications
作者: Lian, Shiguo Liu, Zhongxuan Wang, Jinwei Ren, Zhen Wang, Haila France Telecom Res & Dev Beijing Beijing 100080 Peoples R China Nanjing Univ Sci & Technol Dept Automat Nanjing PR-210094 Peoples R China
A secure image transmission scheme based on JPEG2000 codec is proposed in this paper, which combines encryption with encoding and is suitable for real-time applications. In this scheme, the sensitive data are self-aut... 详细信息
来源: 评论
Digital Information processing and Communications  2011
收藏 引用
丛书名: Communications in Computer and Information Science
2011年
作者: Vaclav Snasael Jan Platos Eyas El-Qawasmeh
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the International conference on Digital Information processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in J...
来源: 评论
Digital Information processing and Communications, Part II  2011
收藏 引用
丛书名: Communications in Computer and Information Science
2011年
作者: Vaclav Snasael Jan Platos Eyas El-Qawasmeh
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the International conference on Digital Information processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in J...
来源: 评论
A mobile System for Skin Cancer Diagnosis and Monitoring
A Mobile System for Skin Cancer Diagnosis and Monitoring
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Gu, Yanliang Tang, Jinshan Michigan Technol Univ Sch Technol Houghton MI 49931 USA
In this paper, we propose a mobile system for aiding doctors in skin cancer diagnosis and other persons in skin cancer monitoring. The basic idea is to use image retrieval techniques to help the users to find the simi... 详细信息
来源: 评论
Cell Phones as Imaging Sensors
Cell Phones as Imaging Sensors
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Bhatti, Nina Baker, Harlyn Marguier, Joanna Berclaz, Jerome Suesstrunk, Sabine Hewlett Packard Labs 1501 Page Mill Dr Palo Alto CA 94304 USA Ecole Polytech Fed Lausanne Sch Comp & Commun Sci IC Lausanne Switzerland
Camera phones are ubiquitous, and consumers have been adopting them faster than any other technology in modern history. When connected to a network, though, they are capable of more than just picture taking: Suddenly,... 详细信息
来源: 评论
Multiple masks based pixel comparison steganalysis method for mobile Imaging
Multiple masks based pixel comparison steganalysis method fo...
收藏 引用
conference on mobile multimedia/image processing for Military and security applications
作者: Agaian, Sos S. Peterson, Gilbert L. Rodriguez, Benjamin M. Univ Texas Dept Elect & Comp Engn Multimedia & Mobile Signal Proc Lab San Antonio TX 78285 USA Grad Sch Engn & Management Air Force Inst Technol Dept Elect & Comp Engn Wright Patterson AFB OH 45433 USA
Steganalysis has many challenges;which include the accurate and efficient detection of hidden content within digital images. This paper focuses on the development of a new multi pixel comparison method used for the de... 详细信息
来源: 评论
A novel method of testing image randomness with applications to image shuffling and encryption
A novel method of testing image randomness with applications...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wu, Yue Agaian, Sos Noonan, Joseph P. Tufts Univ 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio San Antonio 78149 TX USA
This paper discusses the problem of testing the degree of randomness within an image, particularly for a shuffled or encrypted image. Its key contributions are: 1) a mathematical model of perfectly shuffled images;2) ... 详细信息
来源: 评论
SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly
SecurePhone: a mobile phone with biometric authentication an...
收藏 引用
conference on mobile multimedia/image processing for Military and security applications
作者: Ricci, R. Chollet, G. Crispino, M. V. Jassim, S. Koreman, J. Olivar-Dimas, M. Garcia-Salicetti, S. Soria-Rodriguez, P. Informat SRL Via Magazzini Gen 31 I-00154 Rome Italy ENST GET Dept TSI F-75634 Paris France Nergal srl I-00155 Rome Italy Buckingham Univ Buckingham MK18 1EG England Univ Saarland D-66041 Saarbrucken Germany Telefonica Moviles Espana SA E-28001 Madrid Spain INT GET F-91011 Evry France Atos Origin E-28037 Madrid Spain
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the "SecurePhone" - in whic... 详细信息
来源: 评论
A new JPEG-Based steganographic algorithm for mobile devices
A new JPEG-Based steganographic algorithm for mobile devices
收藏 引用
conference on mobile multimedia/image processing for Military and security applications
作者: Agaian, Sos S. Cherukuri, Ravindranath Schneider, Erik C. White, Gregory B. Univ Texas Multimedia & Mobile Signal Proc Lab 6900 N Loop 1604 W San Antonio TX 78249 USA Univ Texas Ctr Infrastruct Assurance & secur San Antonio TX 78249 USA
Currently, cellular phones constitute a significant portion of the global telecommunications market. Modem cellular phones offer sophisticated features such as Internet access, on-board cameras, and expandable memory ... 详细信息
来源: 评论
Improving the recognition of fingerprint biometric system using enhanced image fusion
Improving the recognition of fingerprint biometric system us...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Alsharif, Salim El-Saba, Aed Stripathi, Reshma Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more rel... 详细信息
来源: 评论