咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是191-200 订阅
排序:
DubaiSat-2 image handling  14th
DubaiSat-2 image handling
收藏 引用
14th International Conference on Space Operations, SpaceOps 2016
作者: Zowayed, Khalid Al Harmi, Mohammed Dubai United Arab Emirates
DubaiSat-2 is the United Arab Emirates (UAE) second earth observation satellite. It was launched into a 600 km orbit on the 21st of November 2013. The satellite is owned and operated by the Mohammed Bin Rashid Space C... 详细信息
来源: 评论
A Robust, Non-blind High Capacity Secure Digital Watermarking Scheme for image Secret Information, Authentication and Tampering Localization and Recovery via the Discrete Wavelet Transform
A Robust, Non-blind High Capacity Secure Digital Watermarkin...
收藏 引用
2019 IEEE International Symposium on technologies for Homeland Security, HST 2019
作者: Chaughule, S.S. Megherbi, D.B. CMINDS Research Center University of Massachusetts Department of Electrical and Computer Engineering Lowell United States
In today's world accessibility and trade of advance digital information over the web is of key significance. Security and verification of digital information, including digital images, is one of the greatest conce... 详细信息
来源: 评论
A perceptual encryption scheme for Motion JPEG 2000 standard
A perceptual encryption scheme for Motion JPEG 2000 standard
收藏 引用
International Symposium on Communications and Information technologies (ISCIT)
作者: Osamu Watanabe Takahiro Fukuhara Hitoshi Kiya Dept. of Electronics & Computer Systems Takushoku University Faculty of Info. and Commun. Systems Tokyo Metropolitan University
A new perceptual encryption scheme with an efficient key-management mechanism for the Motion JPEG 2000 based ETC system is proposed in this paper. An ETC system is known as a system that makes image/video communicatio... 详细信息
来源: 评论
An adaptive JPEG compression-encryption system using optimized local quantization matrices
An adaptive JPEG compression-encryption system using optimiz...
收藏 引用
International Conference on Electrical and Computing technologies and Applications (ICECTA)
作者: Rimah Y. Bani Youniss Moh'd Belal Al-Zoubi Arafat Awajan Computer Engineering Department PSUT Amman JO Computer Graphics Department PSUT Amman Jordan Computer Science Department PSUT Amman Jordan
The JPEG compression techniques are known as a standardlossy compression techniques for images. In this paper, an adaptive approach is proposed where some changes in the quantization stage are made. The proposed appro... 详细信息
来源: 评论
The implementation of chaotic encryption scheme for images
The implementation of chaotic encryption scheme for images
收藏 引用
International Conference on Control, Instrumentation, Communication and Computational technologies (ICCICCT)
作者: Veenus P K K Sivasankar Vivek P K V S Dharun Department of CSE Noorul Islam University Kumaracoil Tamil Nadu India Department of IT Noorul Islam University Kumaracoil Tamil Nadu India Department of ECE METS School of Engg Mala Kerala India
The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is pro... 详细信息
来源: 评论
1st International Conference on Advances in Electrical and Computer technologies, ICAECT 2019
1st International Conference on Advances in Electrical and C...
收藏 引用
1st International Conference on Advances in Electrical and Computer technologies, ICAECT 2019
The proceedings contain 119 papers. The special focus in this conference is on Advances in Electrical and Computer technologies. The topics include: Sum modified laplacian-based image fusion in dct domain with super r...
来源: 评论
Effect on Reconstruction of images by Applying Fractal Based Lossy compression Followed by Symmetrical encryption Techniques
Effect on Reconstruction of Images by Applying Fractal Based...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Neetu Gupta Ritu Vijay Banasthali University Banasthali India Banasthali University Banasthali Indi
compression and encryption are two major aspects of cryptanalysis. compression reduces the large bandwidth requirement while encryption provides security against differential unethical attacks during transmission of i... 详细信息
来源: 评论
Securing Medical images using compression techniques with encryption and image Steganography
Securing Medical Images using Compression techniques with en...
收藏 引用
Intelligent technologies (CONIT), International Conference on
作者: Pooranakala K. Vanita Jaitly Department of Computer Applications Hindustan Institute of Technology and Science Chennai Tamil Nadu India
Medical imaging is an essential component of the healthcare sector, enabling the transfer of medical images between widely separated locations to improve healthcare business practices. However, the transmission of med...
来源: 评论
Congress on Smart Computing technologies, CSCT 2022
Congress on Smart Computing Technologies, CSCT 2022
收藏 引用
Congress on Smart Computing technologies, CSCT 2022
The proceedings contain 40 papers. The special focus in this conference is on Smart Computing technologies. The topics include: An Interactive Voicebot for Visually Challenged: Empowering the Realm Among Deaf-Mute and...
来源: 评论
An Efficient image Privacy-Preserving Scheme Based On Mixed Chaotic Map and compression
收藏 引用
INTERNATIONAL JOURNAL OF image AND GRAPHICS 2022年 第2期22卷
作者: Tanveer, Muhammad Shah, Tariq Ali, Asif Shah, Dawood Quaid I Azam Univ Dept Math Islamabad 44000 Pakistan
In the digital modern era, multimedia security has turned into a major concern by the rapid growth of network technologies and digital communications. Accordingly, from the last few decades, the application of nonline... 详细信息
来源: 评论