咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是221-230 订阅
排序:
An alternative method for image encryption by using Neural Networks
An alternative method for Image Encryption by using Neural N...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Satyanarayana Vollala Department of Computer Science and Engineering International Institute of Information Technology-Naya Raipur India
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug... 详细信息
来源: 评论
Enhancing Data Privacy through a Secure Data Hiding Approach Integrated with Lossless compression
Enhancing Data Privacy through a Secure Data Hiding Approach...
收藏 引用
International Conference on Inventive Computation technologies (ICICT)
作者: Manjula M Kakoli Bora Shaila S G Skanda N Raj Thilak R Akanksha Kanchireddy Dept of CSE(Data Science) Dayananda Sagar University Bangalore India
In the contemporary digital landscape, characterized by ubiquitous internet connectivity and broad photo sharing, protecting secret data within photographs is becoming increasingly important. This study describes an i... 详细信息
来源: 评论
A Robust Medical image Watermarking Approach Based on K-Level Clustering and Asymmetric encryption
A Robust Medical Image Watermarking Approach Based on K-Leve...
收藏 引用
Innovative and Intelligent Information technologies (IC3IT), International Conference on
作者: Mohammed Elhabib Kahla Mounir Beggas Abdelkader Laouid Ahcene Bounceur Mostefa Kara Computer Science Department LIAP Laboratory University of El Oued El Oued Algeria Information & Computer Science Department University of Sharjah Sharjah United Arab Emirates Interdisciplinary Research Center for Intelligent Secure Systems (IRC-ISS) King Fahd University of Petroleum and Minerals (KFUPM) Dhahran Saudi Arabia
The increasing use of digital medical images in healthcare has raised significant concerns regarding their security, privacy, and integrity during transmission and storage. Unauthorized access, tampering, and image ma... 详细信息
来源: 评论
Ownership Authentication and Tamper Detection in Digital images via Zero-Watermarking  45
Ownership Authentication and Tamper Detection in Digital Ima...
收藏 引用
45th International Conference on Telecommunications and Signal Processing (TSP)
作者: Morales-Ortega, Adrian Cedillo-Hernandez, Manuel Inst Politecn Nacl ESIME Culhuacan Secc Estudios Posgrad & Invest Mexico City DF Mexico
This paper presents a new zero-watermarking algorithm for digital images. The main challenge in every zero-watermarking algorithm is to create a highly capable, reliable, and distortion-free scheme. Unlike other zero-... 详细信息
来源: 评论
21st International Conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
21st International Conference on Parallel and Distributed Co...
收藏 引用
21st International Conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
The proceedings contain 35 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications, and technologies. The topics include: On the Non-ergodic Convergence Rate of the Directed...
来源: 评论
image steganography with using QR code and cryptography
Image steganography with using QR code and cryptography
收藏 引用
International Conference on Radioelektronika
作者: Vladimír Hajduk Martin Broda Ondrej Kováč Dušan Levický Dept. of Electronics and Multimedia Communications Dept. of Technologies and Electronics Technical University of Košice Košice Slovak Republic
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is... 详细信息
来源: 评论
An image Transmission System Utilizing Chaos-based Watermarking Technique
An Image Transmission System Utilizing Chaos-based Watermark...
收藏 引用
2013 2nd International Symposium on Quantum,Nano and Micro technologies(ISQNM 2013)
作者: Bisheng Zhan Duan Liu College of Public Administration Huazhong University of Science & Technology School of Optical and Electronic Information Huazhong University of Science & Technology
In this paper,an image transmission system utilizing chaos-based watermarking technique for copyright protection of the image transmission system is demonstrated *** system assures when pirated image is found,the ille... 详细信息
来源: 评论
Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic encryption
Robust Blind and Secure Biometric Watermarking Based on Part...
收藏 引用
New technologies, Mobility and Security (NTMS)
作者: Mohamed S. El-Mahallawy Esam A. Hagras Ahmed Zein Eldin Mohamed Waleed Fakhr Arab Academy for Science Technology and Maritime Transport Cairo Egypt Faculty of Engineering Alexandria University Alexandria Egypt
In this paper, a novel Commutative Watermarking and Partial encryption (CWPE) algorithm using single level 2-Dimension Discrete Wavelet Transform (CWPE 2D DWT) and Multi-Map Orbit Hopping Chaotic System (MMOH-CS) is p... 详细信息
来源: 评论
Correlation-based target detection for the Navy's SHARP sensor suite
Correlation-based target detection for the Navy's SHARP sens...
收藏 引用
14th Conference on Automatic Target Recognition
作者: Topiwala, P Casasent, D FastVDO LLC Columbia MD 21046 USA
High resolution, high data rate sensor streams acquired from the Navy Shared Reconnaissance Pod In (SHARP), encompassing unsurpassed resolution EO and IR sensors, covering large tactical areas with detailed surveillan... 详细信息
来源: 评论
High capacity steganography technique based on wavelet transform
High capacity steganography technique based on wavelet trans...
收藏 引用
Online International Conference on Green Engineering and technologies (IC-GET)
作者: V. Divya N. Sasirekha Dept. of Electronics and Communication Engineering Sona College of Technology (Autonomous) Salem Tamil Nadu INDIA
For secured communication of information steganography is preferred, which embeds the information in a cover object. The objective is to propose a modified high-capacity steganography technique based on wavelet transf... 详细信息
来源: 评论