咨询与建议

限定检索结果

文献类型

  • 210 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 54 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 13 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 7 篇 robustness
  • 6 篇 psnr

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
258 条 记 录,以下是121-130 订阅
排序:
encryption of lossless coded videos
Encryption of lossless coded videos
收藏 引用
2019 International Conference on Internet of Things, Embedded Systems and Communications, IINTEC 2019
作者: Ammous, Donia Khlif, Naziha Kammoun, Fahmi Masmoudi, Nouri University of Sfax National School of Engineers of Sfax Laboratory of Electronics and Information Technologies Circuit and System Team 'CS' Sfax3038 Tunisia
Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video... 详细信息
来源: 评论
Biomedical image Integrity Check for Telemedicine Applications by Hash Embedding & Wavelet compression
Biomedical Image Integrity Check for Telemedicine Applicatio...
收藏 引用
International Conference on Networks and Advances in Computational technologies (NetACT)
作者: Baby, Mina K. Madhu, Aswathy Aneesh, R. P. MCET ECE Dept Pathanamthitta Kerala India IHRD Pathanamthitta Kerala India
With the advent of the multimedia & information technology, the medical images play a significant role in the field of Teleconsulting, Telediagnosis & Telesurgery, where an enormous amount of medical data need... 详细信息
来源: 评论
Joint Watermarking\encryption image for Safe Transmission: Application on Medical Imaging
Joint Watermarking\Encryption Image for Safe Transmission: A...
收藏 引用
Global Summit on Computer and Information Technology (GSCIT)
作者: Ajili, Sondes Hajjaji, Mohamed Ali Bouallegue, Belgacem Mtibaa, Abdellatif Univ Monastir Elect & Microelect Lab Monastir Tunisia Natl Engn Sch Monastir Monastir Tunisia
this work presents a new approach of a joint Watermarking! encryption algorithm applied in medical domain such as telemedicine, hence the need to keep the visual aspect of medical images and other conservation of the ... 详细信息
来源: 评论
A Privacy-Preserving image Retrieval Scheme with a Mixture of Plain and EtC images  4
A Privacy-Preserving Image Retrieval Scheme with a Mixture o...
收藏 引用
4th IEEE Global Conference on Life Sciences and technologies, LifeTech 2022
作者: Iida, Kenta Kiya, Hitoshi Tokyo Metropolitan University Tokyo Japan
In this paper, we propose a novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images."In the... 详细信息
来源: 评论
Coding and transmission of subband coded images in the Internet
Coding and transmission of subband coded images in the Inter...
收藏 引用
Conference on image compression and encryption technologies
作者: Wah, BW Su, X Univ Illinois Dept Elect & Comp Engn Urbana IL 61801 USA
Subband-coded images can be transmitted in the Internet using either the TCP or the UDP protocol. Delivery by TCP gives superior decoding quality but with very long delays when the network is unreliable, whereas deliv... 详细信息
来源: 评论
Computational complexity of object-based image compression
Computational complexity of object-based image compression
收藏 引用
Mathematics of Data/image Coding, compression, and encryption VIII, with Applications
作者: Schmalz, Mark S. Ritter, Gerhard X. Center for Computer Vision and Visualization University of Florida Gainesville FL 32611
image compression via transform coding applied to small rectangular regions or encoding blocks appears to be approaching asymptotic rate-distortion performance. However, an emerging compression technology, called obje... 详细信息
来源: 评论
Autosophy information theory provides lossless data and video compression based on the data content
Autosophy information theory provides lossless data and vide...
收藏 引用
Conference on Digital compression technologies and Systems for Video Communications
作者: Holtz, K Holtz, E Holtz, D OMNI DIMENS NETWORKS SAN FRANCISCOCA 94109
A new autosophy information theory provides an alternative to the classical Shannon information theory. Using the new theory in communication networks provides both a high degree of lossless compression and virtually ... 详细信息
来源: 评论
Robust image Obfuscation for Privacy Protection in Web 2.0 Applications
Robust Image Obfuscation for Privacy Protection in Web 2.0 A...
收藏 引用
Conference on Media Watermarking, Security, and Forensics
作者: Poller, Andreas Steinebach, Martin Liu, Huajian Fraunhofer Inst Secure Informat Technol Darmstadt Germany
We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in W... 详细信息
来源: 评论
Dynamic segment designate lossless coding for sparse binary patterns
Dynamic segment designate lossless coding for sparse binary ...
收藏 引用
Conference on image compression and encryption technologies
作者: Tong, XF Zhang, TX Huazhong Univ Sci & Technol State Key Lab Image Proc & Intelligent Control Inst Pattern Recognit & Artificial Intelligence Wuhan 430074 Peoples R China
A dynamic segment designate lossless coding (DSDC for short) method for sparse binary patterns is proposed in this paper. First of all, in order to reduce the correlation of the binary image, we carry out peculiar dif... 详细信息
来源: 评论
Improving LZW compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code
收藏 引用
IEEE ACCESS 2023年 11卷 51915-51929页
作者: Abu Jrai, Enas Alsharari, Shoroq Almazaydeh, Laiali Elleithy, Khaled Abu-Hamdan, Osama Al Balqa Appl Univ Maan Univ Coll Dept Basic Sci Salt 19117 Jordan Al Hussein Bin Talal Univ Fac Informat Technol Dept Software Engn Maan Jordan Univ Bridgeport Dept Comp Sci & Engn Bridgeport CT 06604 USA Univ Nevada Sch Comp & Informat Sci Reno NV 89557 USA
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression. During t... 详细信息
来源: 评论