咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 22 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 60 篇 电气工程
    • 35 篇 计算机科学与技术...
    • 26 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 测绘科学与技术
  • 94 篇 理学
    • 86 篇 物理学
    • 4 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
  • 65 篇 医学
    • 65 篇 临床医学
  • 6 篇 军事学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 17 篇 security
  • 12 篇 information syst...
  • 12 篇 computer communi...
  • 11 篇 steganography
  • 11 篇 artificial intel...
  • 11 篇 information stor...
  • 8 篇 algorithm analys...
  • 7 篇 encryption
  • 6 篇 databases
  • 6 篇 image processing
  • 6 篇 biometrics
  • 5 篇 image enhancemen...
  • 5 篇 image segmentati...
  • 5 篇 software enginee...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 information
  • 4 篇 signal processin...

机构

  • 6 篇 king saud univer...
  • 6 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 cuny coll staten...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 univ texas san a...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 michigan technol...
  • 2 篇 mcq inc 1551 for...
  • 2 篇 bae syst inc fas...
  • 2 篇 international is...
  • 2 篇 atos turkey anka...
  • 2 篇 vsb – technical ...
  • 2 篇 univ texas san a...
  • 2 篇 tufts univ 161 c...
  • 2 篇 indiana univ pur...
  • 2 篇 univ s alabama m...
  • 2 篇 tufts univ dept ...

作者

  • 15 篇 agaian sos s.
  • 12 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 7 篇 agaian sos
  • 6 篇 creutzburg reine...
  • 6 篇 panetta karen
  • 5 篇 jassim sabah
  • 5 篇 collins james c.
  • 4 篇 kroeger knut
  • 4 篇 feria erlan h.
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 gang shen
  • 4 篇 xiong huang
  • 4 篇 mazdak zamani

语言

  • 175 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing for Military and Security Applications"
179 条 记 录,以下是11-20 订阅
排序:
Secure steganography designed for mobile platforms
Secure steganography designed for mobile platforms
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Cherukuri, Ravindranath Sifuentes, Ronnie R. Univ Texas MMSP Lab 6900 N Loop 1604 W San Antonio TX 78249 USA
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data ... 详细信息
来源: 评论
The mathematical theory of signal processing and compression-designs
The mathematical theory of signal processing and compression...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Feria, Erlan H. CUNY Coll Staten Isl Dept Engn Sci & Phys Staten Isl NY 10314 USA
The fundamentals of the mathematical theory of signal processing, named processor coding, will be shown to inherently arise as the computational time compression dual of Shannon's mathematical theory of communicat... 详细信息
来源: 评论
RHINO: Armoured plated networking with intelligent high speed wireless Ad-Hoc capability
RHINO: Armoured plated networking with intelligent high spee...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Markarian, Garik Singh, Farid Univ Lancaster Lancaster LA1 4YW England Britannia 2000 Ltd White Waltham England
This paper describes the concept of an intelligent high speed wireless ad-hoc network, which is currently being developed The technology aims at, not replacing any of the existing standards, but aims to complement the... 详细信息
来源: 评论
A new JPEG-Based steganographic algorithm for mobile devices
A new JPEG-Based steganographic algorithm for mobile devices
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Cherukuri, Ravindranath Schneider, Erik C. White, Gregory B. Univ Texas Multimedia & Mobile Signal Proc Lab 6900 N Loop 1604 W San Antonio TX 78249 USA Univ Texas Ctr Infrastruct Assurance & secur San Antonio TX 78249 USA
Currently, cellular phones constitute a significant portion of the global telecommunications market. Modem cellular phones offer sophisticated features such as Internet access, on-board cameras, and expandable memory ... 详细信息
来源: 评论
Human visual system based image enhancement
Human visual system based image enhancement
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Wharton, Eric J. Panetta, Karen A. Agaian, Sos S. Tufts Univ Dept Elect & Comp Engn 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio Coll Engn San Antonio TX 78249 USA
This paper presents a method of image enhancement using an adaptive thresholding method based on the human visual system. We utilize a number of different enhancement algorithms applied selectively to the different re... 详细信息
来源: 评论
On privacy-protected outsourced processing for mobile multimedia
On privacy-protected outsourced processing for mobile multim...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Svendsen, Tristen Wang, Zhaohong Calif State Univ Chico Elect & Comp Engn Dept Chico CA 95929 USA
mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the custom... 详细信息
来源: 评论
Network friendly media security: Rationales, solutions, and open issues
Network friendly media security: Rationales, solutions, and ...
收藏 引用
International conference on image processing (ICIP 2004)
作者: Zeng, WJ Zhuang, XH Lan, JQ Univ Missouri Dept Comp Sci Columbia MO 65211 USA
Network friendly media security refers to the security technologies that are specifically designed to cope with existing and future multimedia networking infrastructures and technologies so as to case the deployment a... 详细信息
来源: 评论
Multi-level signature based biometric authentication using watermarking
Multi-level signature based biometric authentication using w...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Maiorana, Emanuele Campisi, Patrizio Neri, Alessandro Univ Roma Tre Dip Elettr Applicata Via Vasca Navale 84 I-00146 Rome Italy
In the last decade a lot of efforts have been devoted to the development of biometrics-based authentication systems. In this paper we propose a signature-based biometric authentication system, where watermarking techn... 详细信息
来源: 评论
Steganography anomaly detection using simple one-class classification
Steganography anomaly detection using simple one-class class...
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Rodriguez, Benjamin M. Peterson, Gilbert L. Agaian, Sos S. Univ Texas Dept Elect & Comp Engn San Antonio TX 78285 USA Univ Texas San Antonio Dept Elect & Comp Engn Multimedia & Mobile Signal Proc Lab San Antonio TX USA
There are several security issues tied to multimedia when implementing the various applications in the cellular phone and wireless industry. One primary concern is the potential ease of implementing a steganography sy... 详细信息
来源: 评论
Switching theory-based steganographic system for JPEG images
Switching theory-based steganographic system for JPEG images
收藏 引用
conference on mobile multimedia/image processing for military and security applications
作者: Cherukuri, Ravindranath C. Agaian, Sos. S. Univ Texas Mobile Multimedia Signal Proc Lab 1 UTSA Circle San Antonio TX 78249 USA
Cellular communications constitute a significant portion of the global telecommunications market. Therefore, the need for secured communication over a mobile platform has increased exponentially. Steganography is an a... 详细信息
来源: 评论