咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是111-120 订阅
排序:
IRIS image encryption and Decryption Based Application Using Chaos System and Confusion Technique
收藏 引用
International Conference on Modeling, Simulation and Optimization, CoMSO 2021
作者: Archana, K. Kumar, Sharath Sashi Gokak, Pradeep P. Pragna, M. Shruthi, M.L.J. Department of Electronics and Communication Engineering PES University RR Campus Karnataka Bangalore India
In today’s era, Digital image Security is of primary importance and is receiving a huge amount of consideration. Because digital photographs are used in almost all technological fields, confidential data may be prese... 详细信息
来源: 评论
An energy-efficient image representation for secure mobile systems
收藏 引用
4th International IFIP-TC6 Networking Conference
作者: Woo, T Gebotys, C Naik, S Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
In a mobile device, two major sources of energy consumption are energy used for computation and energy used for transmission. Computation energy can be reduced by minimizing the time spent on compression. Transmission... 详细信息
来源: 评论
A robust and secure scheme for image communication over wireless channels
A robust and secure scheme for image communication over wire...
收藏 引用
ETW'05 - 7th IEEE Emerging technologies Workshop: Circuits and Systems for 4G Mobile Communications 2005
作者: Deergha Rao, K. IEEE India Research and Training Unit for Navigational Electronics Osmania University Hyderabad. 500007 India
Chaos based encryption may offer new quality in secure data transmission. Many chaotic image encryption and decryption algorithms have been reported in the literature. However, the feature of higher compression of the... 详细信息
来源: 评论
A Survey on image encryption using Elliptic Curve Cryptography  7
A Survey on Image Encryption using Elliptic Curve Cryptograp...
收藏 引用
7th International Conference on Inventive Computation technologies, ICICT 2024
作者: Deep, Mothukuri Mani Praveen, Mamidi Naveen Durga Deekshith, Patnana Sai Viswa Teja, Perla Kannaiah, Sathish Kumar Prasad, K.V. Koneru Lakshmaiah Education Foundation Computer Science And Engineering Ap Vaddeswaram India
Elliptic Curve Cryptography (ECC) is a way to keep information secure. It is better than RSA because it can provide the same level of security with smaller codes. This causes less use of resources and lower memory nee... 详细信息
来源: 评论
Method of Information Hiding Based on the Theory of Wavelet Transform
Method of Information Hiding Based on the Theory of Wavelet ...
收藏 引用
6th International Symposium on Advanced Optical Manufacturing and Testing technologies (AOMATT) - Optical System technologies for Manufacturing and Testing
作者: Ma, Zuohong Hua, Wenshen Li, Xiaoming Zhang, Yue Mech Engn Coll Dept Opt & Elect Engn Shijiazhuang 050003 Peoples R China
In combination of the advantages of the optical encryption technology and optical hiding technology, this paper is going to reveal the way of hiding the encrypted result obtained from scrambling technology in the low-... 详细信息
来源: 评论
Combination of neural network and advanced encryption and decryption technique is used for digital image watermarking
Combination of neural network and advanced encryption and de...
收藏 引用
5th International Symposium on Intelligent Systems technologies and Applications (ISTA) / International Conference on Applied Soft Computing and Communication Networks (ACN)
作者: Gonge, Sudhanshu Suhas Vishwakarma Inst Technol Dept Comp Engn Pune Maharashtra India
The computer system represents data in various format viz (i) Audio, (ii) Video, (iii) Text, (iv) Message, and (v) image format. There are many ways through which, data can be easily transferred. The process of transf... 详细信息
来源: 评论
Radar signal compression using wavelet transforms
Radar signal compression using wavelet transforms
收藏 引用
Conference on image compression and encryption technologies
作者: Zhou, Y Li, FP Xu, Y Qin, QQ Li, D Command Automat Engn Dept Wuhan 430010 Peoples R China
Generally, the echo of radar can be regarded as a combination of useful signal and noise. In this paper, an efficient wavelet-based non-linear signal compression scheme is presented, which takes full advantage of the ... 详细信息
来源: 评论
A fractal-coding-like lossless binary image compressing method
A fractal-coding-like lossless binary image compressing meth...
收藏 引用
Conference on image compression and encryption technologies
作者: Zhang, TX Tong, XF Zuo, Z Li, Y Huazhong Univ Sci & Technol State Key Lab Image Proc & Intelligent Control Inst Pattern Recognit & Artificial Intelligence Wuhan 430074 Peoples R China
A new binary image lossless compressing method is proposed, which regards a binary image as being constructed of a limited number of fractal elements that have undergone a series of operations such as contraction/dila... 详细信息
来源: 评论
An image coding algorithm using a new VQ distortion measure
An image coding algorithm using a new VQ distortion measure
收藏 引用
Conference on image compression and encryption technologies
作者: Jiang, SD Wang, Q Sun, SH Harbin Inst Technol Dept Automat Test & Control Harbin 150001 Peoples R China
As an efficient technique for data compression, vector quantization (VQ) has been successfully used for various applications involving VQ-based encoding and VQ-based recognition. The response time of encoding and reco... 详细信息
来源: 评论
An alternative method for image encryption by using Neural Networks  15
An alternative method for Image Encryption by using Neural N...
收藏 引用
15th International Conference on Computing Communication and Networking technologies, ICCCNT 2024
作者: Vollala, Satyanarayana International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug... 详细信息
来源: 评论