咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是101-110 订阅
排序:
An optimized architecture to perform image compression and encryption simultaneously using modified DCT algorithm
An optimized architecture to perform image compression and e...
收藏 引用
2011 - International Conference on Signal Processing, Communication, Computing and Networking technologies, ICSCCN-2011
作者: Sateesh, S.V.V. Sakthivel, R. Nirosha, K. Kittur, Harish M. VIT University Vellore TN India
Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (IDCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compres... 详细信息
来源: 评论
A Novel Selective encryption DWT-based Algorithm for Medical images  14
A Novel Selective Encryption DWT-based Algorithm for Medical...
收藏 引用
14th International Conference on Computer Graphics, Imaging and Visualization (CGiV)
作者: Abdmouleh, Med Karim Khalfallah, An Bouhlel, Med Salim Univ Sfax Higher Inst Biotechnol Res Unit Sci & Technol Image & Telecommun Sfax Tunisia
The remarkable development of the medical imagery is due to the large use of telecommunications and information technologies in the medical domain. However, since the telemedicine is a medical act that must answer to ... 详细信息
来源: 评论
Selective encryption techniques of JPEG2000 codestream for medical images transmission
收藏 引用
WSEAS Transactions on Circuits and Systems 2008年 第7期7卷 718-727页
作者: Brahimi, Zahia Bessalah, Hamid Tarabet, A. Kholladi, M.K. Centre de Développement des Technologies Avancées BP 17 Baba Hassen Alger Algeria Université Mohamed Mentouri de Constantine
In this paper, novel selective encryption image schemes based on JPEG2000 are proposed. The first one encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we ... 详细信息
来源: 评论
3-D scattered dataset compression based on Gaussian curvature
3-D scattered dataset compression based on Gaussian curvatur...
收藏 引用
Conference on image compression and encryption technologies
作者: Li, ZY Li, DH Tang, SW Jing, X Peking Univ Ctr Informat Sci Beijing 100871 Peoples R China
A compression method of 3D scattered dataset based on octree is proposed in this paper. The Gaussian curvature of a surface is used as the criterion to compress the dataset. The points containing more structural infor... 详细信息
来源: 评论
image encryption based on Walsh Hadamard and fractional Fourier transform using Radial Hilbert Mask
Image encryption based on Walsh Hadamard and fractional Four...
收藏 引用
International Conference on Computing and Communication technologies for Smart Nation (IC3TSN)
作者: Maan, Priyanka Singh, Hukum Kumari, A. Charan NorthCap Univ CSE & IT Dept Gurugram India NorthCap Univ Dept Appl Sci Gurugram India
In this letter an approach for double image encryption practicing Double Random Phase Encoding (DRPE) technique that is based on Walsh lIadamard transform (WIIT) and fractional Fourier transform (FRT) is proposed. The... 详细信息
来源: 评论
Crypto-compression of medical images by selective encryption of DCT
Crypto-compression of medical images by selective encryption...
收藏 引用
13th European Signal Processing Conference, EUSIPCO 2005
作者: Puech, W. Rodrigues, J.M. Laboratoire LIRMM UMR CNRS 5506 Université Montpellier II 161 rue Ada 34392 Montpellier Cedex 05 France
The traffic of digital images has grown rapidly in the Internet. Security of image becomes important for many sectors mainly for medical applications. Nowadays, the transmission of medical images is a daily routine, e... 详细信息
来源: 评论
Advanced data compression promises the next big leap in network performance
Advanced data compression promises the next big leap in netw...
收藏 引用
EUROPTO Symposium on Broadband European Networks (SYBEN 98)
作者: Holtz, K Holtz, E Kalienky, D Omni Dimens Networks San Francisco CA 94109 USA
Three recently introduced technologies: a new Autosophy information theory;fast Content Addressable Memories;and Packet Switching protocols, are combined in data compression chipsets to improve network throughput with... 详细信息
来源: 评论
The IP-based storage of image information
The IP-based storage of image information
收藏 引用
Conference on image compression and encryption technologies
作者: Fu, XL Xie, CS Liu, ZB Huazhong Univ Sci & Technol Natl Storage Syst Lab Comp Sch Wuhan 430074 Peoples R China
With the fast growth of data in multispectral image processing, the traditional storage architecture was challenged, It is currently being replaced by Storage Area Networks (SAN), which makes storage devices externali... 详细信息
来源: 评论
Visually Meaningful image encryption Algorithm Based on Parallel Compressive Sensing and Cellular Neural Network  4th
Visually Meaningful Image Encryption Algorithm Based on Para...
收藏 引用
4th International Conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2021
作者: Zhang, Renxiu Jiang, Donghua Ding, Wei Wang, Ya Wu, Yanan Guang, Yerui Ding, Qun Electronic Engineering College Heilongjiang University Harbin150080 China School of Information Engineering Chang’an University Xi’an710064 China
At present, most image encryption algorithms protect the image by converting the original image into a visually meaningless noise-like image. However, the noise-like image can easily attract the attention of attackers... 详细信息
来源: 评论
Medical image Authentication and Restoration Based on mCloud Computing: Towards Reliant Medical Digitization Era  4th
Medical Image Authentication and Restoration Based on mCloud...
收藏 引用
4th Doctoral Symposium on Computational Intelligence, DoSCI 2023
作者: Al-Rubbiay, Fatma Hassan Youssef, Asraa Y. Mahmood, Sawsan. D. Department of Statistics College of Economics and Administration Mustansiriyah University Baghdad Iraq College of Agriculture Department of Soil Sciences and Water Resources University of Diyala Baqubah Iraq College of Education for Pure Science Computer Science Department University of Diyala Baqubah Iraq
The protection of multimedia data, particularly images, has become crucial during the past few years. Over encryption or data-hiding technologies, image data, in particular medical image (MedImg) data, can be secured.... 详细信息
来源: 评论