咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是1-10 订阅
排序:
Proceedings of SPIE: mobile multimedia/image processing for military and security applications
Proceedings of SPIE: Mobile Multimedia/Image Processing for ...
收藏 引用
mobile multimedia/image processing for military and security applications
The proceedings contain 25 papers. The topics discussed include: reduced memory JPEG decompression for mobile devices;an efficient real-time video compression algorithm with high feature preserving capability;an imagi... 详细信息
来源: 评论
mobile multimedia/image processing for military and security applications 2007
Mobile Multimedia/Image Processing for Military and Security...
收藏 引用
mobile multimedia/image processing for military and security applications 2007
The proceedings contain 24 papers. The topics discussed include: recent advances in multiview distributed video coding;super-resolution-based enhancement for real-time ultra-low-bit-rate video coding;signal compressio... 详细信息
来源: 评论
A logarithmic measure of image enhancement
A logarithmic measure of image enhancement
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Wharton, Eric Agaian, Sos Panetta, Karen Tufts Univ 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio San Antonio TX 78249 USA
image enhancement performance is currently judged subjectively, with no reliable manner of quantifying the results of an enhancement. Current quantitative measures rely on linear algorithms to determine contrast, leav... 详细信息
来源: 评论
An Imaging toolbox for smart phone applications
An Imaging toolbox for smart phone applications
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Panchul, Aleksandr Bhupathiraju, Deepthi Agaian, Sos Akopian, David Univ Texas San Antonio 6900 N Loop 1604 W San Antonio TX 78249 USA
The paper presents a Digital image processing toolbox for cellular phones. It is intended for users dealing with imaging algorithms and allows the processing of real images taken by the camera phones. For example, use... 详细信息
来源: 评论
Data hiding based on Fibonacci-Haar Transform
Data hiding based on Fibonacci-Haar Transform
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Battisti, F. Egiazarian, K. Carli, M. Neri, A. Univ Roma TRE Rome Italy Tampere Univ Technol Tampere Finland
In this contribution, we present a novel technique for imperceptible and robust watermarking of digital images. It is based on the host image 2-th level decomposition using the Fibonacci-Haar Transform (FHT) and on th... 详细信息
来源: 评论
A chaotic cipher Mmohocc and its security analysis
A chaotic cipher Mmohocc and its security analysis
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Zhang, Xiaowen Shu, Li Tang, Ke CUNY Grad Ctr CS Dept New York NY 10021 USA Sichuan Univ Sch Comp Sci Chengdu Peoples R China
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics. The designs of the major components of the cipher are given. Its cryptographic properties of period,... 详细信息
来源: 评论
Secure access control to hidden data by biometric features
Secure access control to hidden data by biometric features
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Cancellaro, J. Carli, M. Egiazarian, K. Neri, A. Univ Roma TRE Dept Appl Elect Via Vasca Navale 84 Rome Italy Tampere Univ Technol Inst Signal Proc Tampere Finland
In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of th... 详细信息
来源: 评论
Impact on routers performance to classify and condition real-time interactive multimedia traffic based on its PHB
Impact on routers performance to classify and condition real...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Alsharif, Salim Al-Khatib, Mazen Tung, Ye Univ S Alabama Mobile AL 36688 USA
This paper presents a new method which enhances the quality-of-service (QoS) and hence the response time and queuing delay of real-time interactive multimedia over the Internet. A service class based on differentiated... 详细信息
来源: 评论
Secure image communication for network applications
Secure image communication for network applications
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Lian, Shiguo Liu, Zhongxuan Wang, Jinwei Ren, Zhen Wang, Haila France Telecom Res & Dev Beijing Beijing 100080 Peoples R China Nanjing Univ Sci & Technol Dept Automat Nanjing PR-210094 Peoples R China
A secure image transmission scheme based on JPEG2000 codec is proposed in this paper, which combines encryption with encoding and is suitable for real-time applications. In this scheme, the sensitive data are self-aut... 详细信息
来源: 评论
Multiple masks based pixel comparison steganalysis method for mobile Imaging
Multiple masks based pixel comparison steganalysis method fo...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Peterson, Gilbert L. Rodriguez, Benjamin M. Univ Texas Dept Elect & Comp Engn Multimedia & Mobile Signal Proc Lab San Antonio TX 78285 USA Grad Sch Engn & Management Air Force Inst Technol Dept Elect & Comp Engn Wright Patterson AFB OH 45433 USA
Steganalysis has many challenges;which include the accurate and efficient detection of hidden content within digital images. This paper focuses on the development of a new multi pixel comparison method used for the de... 详细信息
来源: 评论