咨询与建议

限定检索结果

文献类型

  • 210 篇 会议
  • 44 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 100 篇 计算机科学与技术...
    • 54 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 14 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 94 篇 理学
    • 64 篇 物理学
    • 31 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 54 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 15 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 13 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 7 篇 robustness
  • 6 篇 psnr

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 8 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是91-100 订阅
排序:
Secure and Robust Watermarking Scheme based on Motion Features for Video Object
Secure and Robust Watermarking Scheme based on Motion Featur...
收藏 引用
International Conference on Reliability, Infocom technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Rakesh Ahuja Purnima Mohd Junedul Haque Sarvesh Tanwar Nidhi Gautam Ajay Rana Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Amity Institution of Information Technology Amity university Noida Uttar Pradesh University Institute of Applied Management Sciences Panjab University Chandigarh AIIT Amity University Uttar Pradesh Noida India
The rapid development of worthy internet bandwidth transfers the digital multimedia objects to remote computer system instantaneously. The advent of digital technologies makes possible to create multiple identical cop... 详细信息
来源: 评论
An efficient versatile fast correlation vector quantization scheme based reversible data hiding on image processing
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2020年 第5期12卷 5179-5189页
作者: Prabha, K. R. Jagadeeswari, M. Nataraj, B. Department of ECE Sri Ramakrishna Engineering College Coimbatore India
The Reversible Data Hiding (RHD) is the one of the useful technologies to solve the issues in multimedia security. The lossless data hiding is the most promising data technique; it needs to provide the complete data w...
来源: 评论
Efficient Data compression Scheme for Secured Application Needs  22nd
Efficient Data Compression Scheme for Secured Application Ne...
收藏 引用
22nd International Symposium on VLSI Design and Test, VDAT 2018
作者: Kashyap, Ravi Verma, Twinkle Kwatra, Priyanka Rout, Sidhartha Sankar Jaypee Institute of Information Technology Noida India Indraprastha Institute of Information Technology Delhi New Delhi India
The widespread availability of 3G/4G network could make Intelligent Traffic Systems (ITS) capable of wirelessly connecting to the data networks. The near future possibility of 5G communication would make this service ... 详细信息
来源: 评论
Optimized Transmission of Encrypted images over Wireless Channels
Optimized Transmission of Encrypted Images over Wireless Cha...
收藏 引用
IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)
作者: Yandy A. Yanes-Baño José R. Rodríguez-Cruz Cornelio Posadas-Castillo Miguel A. Platas-Garza Ernesto Zambrano-Serrano Jéssica E. Treviño-Ortiz Fac. de Ingeniería Mecánica y Eléctrica Universidad Autónoma de Nuevo León San Nicolás de los Garza NL México
The transmission of images over wireless channels is increasing with advances in wireless communication technologies. However, ensuring secure and efficient transmission is a major challenge because intrusive receiver... 详细信息
来源: 评论
A Robust, Non-blind High Capacity Secure Digital Watermarking Scheme for image Secret Information, Authentication and Tampering Localization and Recovery via the Discrete Wavelet Transform
A Robust, Non-blind High Capacity Secure Digital Watermarkin...
收藏 引用
2019 IEEE International Symposium on technologies for Homeland Security, HST 2019
作者: Chaughule, S.S. Megherbi, D.B. CMINDS Research Center University of Massachusetts Department of Electrical and Computer Engineering Lowell United States
In today's world accessibility and trade of advance digital information over the web is of key significance. Security and verification of digital information, including digital images, is one of the greatest conce... 详细信息
来源: 评论
Cloud is safe when compressive: Efficient image privacy protection via shuffling enabled compressive sensing
收藏 引用
COMPUTER COMMUNICATIONS 2018年 117卷 36-45页
作者: Wu, Xuangou Tang, Shaojie Yang, Panlong Xiang, Chaocan Zheng, Xiao Anhui Univ Technol Sch Comp Sci & Technol Maanshan Peoples R China Univ Texas Dallas Naveen Jindal Sch Management Richardson TX 75083 USA Univ Sci & Technol China Sch Comp Sci & Technol Hefei Anhui Peoples R China Logist Engn Univ Chongqing Peoples R China
Cloud-assisted image services are widely used for various applications. Due to the high computational complexity of existing image encryption techniques, privacy protection becomes extremely challenging for resource c... 详细信息
来源: 评论
Selective Area encryption using Machine Learning Technique
Selective Area Encryption using Machine Learning Technique
收藏 引用
Innovations in Power and Advanced Computing technologies (i-PACT)
作者: Soumya Kelur Ranjan Kumar H S Raju K. Dept. of CS& E NMAMIT Karnataka India
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in...
来源: 评论
encryption of lossless coded videos
Encryption of lossless coded videos
收藏 引用
International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)
作者: Donia Ammous Naziha Khlif Fahmi Kammoun Nouri Masmoudi University of Sfax National School of Engineers of Sfax Laboratory of Electronics and Information Technologies Circuit and System Team “C&S” Sfax Tunisie
Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video...
来源: 评论
Blended Vector Matrix On Different Channels Of image encryption With Multi-Level Distinct Frequency Based Chaotic Approach To Prevent Cyber Crimes By Using Affine Transformation  2
Blended Vector Matrix On Different Channels Of Image Encrypt...
收藏 引用
International Conference on Inventive Communication and Computational technologies (ICICCT)
作者: Mathur, Harsh Veenadhari, S. AISECT Univ Bhopal India
Security attacks through Internet has proliferated in recent years. Henceforth, information security is a challenge of very serious global concern of the present time. The protection of image data from unauthorized ac... 详细信息
来源: 评论
An encryption Algorithm for ROI images  13th
An Encryption Algorithm for ROI Images
收藏 引用
13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
作者: Sun, Chao Li, Li Liu, Yuqi Harbin Inst Technol Dept Automat Test & Control Xidazhi St 92 Harbin 150080 Heilongjiang Peoples R China
According to JPEG2000 image encryption algorithm based on confusion of the wavelet coefficients cannot support region-of-interest(ROI) image coding, an encryption method for ROI images is proposed. The proposed method... 详细信息
来源: 评论