咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是51-60 订阅
排序:
A Perceptual encryption Scheme for Motion JPEG 2000 Standard  15
A Perceptual Encryption Scheme for Motion JPEG 2000 Standard
收藏 引用
15th International Symposium on Communications and Information technologies (ISCIT)
作者: Watanabe, Osamu Fukuhara, Takahiro Kiya, Hitoshi Takushoku Univ Dept Elect & Comp Syst Tokyo Japan Tokyo Metropolitan Univ Fac Info & Commun Syst Tokyo Japan
A new perceptual encryption scheme with an efficient key-management mechanism for the Motion JPEG 2000 based ETC system is proposed in this paper. An ETC system is known as a system that makes image/video communicatio... 详细信息
来源: 评论
ACE (Advanced compression encryption) Scheme for image Authentication
ACE (Advanced Compression Encryption) Scheme for Image Authe...
收藏 引用
International Conference on Information and Communication Technology for Sustainable Development (ICT4SD)
作者: Sangwan, Bhavna Bhatia, Sakshi Technol Inst Text & Sci Dept Comp Engn Bhiwani India
In ancient times, there was a need to protect data. Due to the pervasive range in the field of security, several technologies came into existence. But the whole idea of securing data from attacks took a quick turn in ... 详细信息
来源: 评论
Privacy-preserving image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed images  3
Privacy-preserving Image Retrieval Scheme Allowing Mixed Use...
收藏 引用
IEEE 3rd Global Conference on Life Sciences and technologies (IEEE LifeTech)
作者: Iida, Kenta Kiya, Hitoshi Tokyo Metropolitan Univ Tokyo Japan
We propose a novel content based-image retrieval scheme for encryption-then-compression (EtC) images. In conventional retrieval schemes for EtC images, the JPEG standard was applied to EtC images as a compression meth... 详细信息
来源: 评论
Crypto-compression of medical image Based on DCT and chaotic system
Crypto-compression of medical image Based on DCT and chaotic...
收藏 引用
Global Summit on Computer and Information Technology (GSCIT)
作者: Dridi, Manel Bouallegue, Belgacem Mtibaa, Abdellatif Univ Monastir Lab E E CSR Grp Monastir Tunisia Univ Monastir Natl Engn Sch Monastir Monastir Tunisia
This paper proposes a crypto-compression scheme to protect the distribution and storage of digital medical images. The proposed process uses a chaotic system in order to provide an efficient digital medical images enc... 详细信息
来源: 评论
Adaptation-aware encryption of scalable H.264/AVC video for content security
收藏 引用
SIGNAL PROCESSING-image COMMUNICATION 2009年 第6期24卷 468-483页
作者: Arachchi, H. Kodikara Perramon, X. Dogan, S. Kondoz, A. M. Univ Surrey I Lab CCSR Guildford GU2 7XH Surrey England Univ Pompeu Fabra Dept Informat & Commun Technol Barcelona Spain
Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combine... 详细信息
来源: 评论
Hiding Data Using Efficient Combination of RSA Cryptography, and compression Steganography Techniques
收藏 引用
IEEE ACCESS 2021年 9卷 31805-31815页
作者: Wahab, Osama Fouad Abdel Khalaf, Ashraf A. M. Hussein, Aziza I. Hamed, Hesham F. A. Minia Univ Fac Engn El Minia 61111 Egypt Menou Univ Fac Elect Engn Menoufia 32952 Egypt Effat Univ Dept Elect & Comp Engn Jeddah 8482 Saudi Arabia Egyptian Russian Univ Dept Telecommun Engn Badr 11829 Egypt
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There... 详细信息
来源: 评论
A New image Crypto-compression System SPIHT-PSCS
A New Image Crypto-compression System SPIHT-PSCS
收藏 引用
2nd International Conference on Control, Decision and Information technologies (CoDIT)
作者: Hadjem, Tarek Azzaz, Mohamed Salah Tanougast, Camel Sadoudi, Said Ecole Mil Polytech Lab Syst Commun Algiers Algeria Univ Lorraine LCOMS ASEC Team F-57070 Metz France
In this paper, a new algorithm combined compression and image encryption is presented. The proposed algorithm can be used in the field of high-speed confidential data transmission where security is required. The compr... 详细信息
来源: 评论
Digital watermarking based on self-similarity in DWT of image
Digital watermarking based on self-similarity in DWT of imag...
收藏 引用
Conference on image compression and encryption technologies
作者: Cao, HQ Zhu, GX Zhu, YT Zhang, ZB Huazhong Univ Sci & Technol Dept Elect & Informat Engn Wuhan 430074 Peoples R China
Digital watermarking has been recently proposed as the mean for property right protection of digital products, In this paper we analyze the self-similarities of wavelet transform and present a new approach to embed a ... 详细信息
来源: 评论
An efficient DCT-based cryptocompression scheme for a secure and authentic medical image transmission
收藏 引用
JOURNAL OF TESTING AND EVALUATION 2006年 第6期34卷 459-463页
作者: Bouhlel, Mohamed Salim Kammoun, Fahmi Garcia, Eric Higher Inst Biotechnol Sfax Res Unit Sci & Technol Image & Telecommun Sfax 3038 Tunisia Fac Sci Sfax Dept Phys Sfax 3018 Tunisia Univ Franche Comte LIFC CNRS FRE 2661 F-25030 Besancon France
The use of telecommunications and information technologies in the medicine domain evolved these last years breathtakingly. This involves the development of the applications bound to the telemedicine. Seeing the import... 详细信息
来源: 评论
Compressive Sensing based Medical image compression and encryption using Proposed 1-D Chaotic Map
Compressive Sensing based Medical Image Compression and Encr...
收藏 引用
4th IEEE International Conference on Wireless Communications Signal Processing and Networking (WiSPNET) - Advancing Wireless and Mobile Communications technologies for 2020 Information Society
作者: Ashwini, K. Amutha, R. Immaculate, R. Reshma Anusha, P. SSN Coll Engn Dept ECE Chennai Tamil Nadu India
Compressive sensing and chaos based simultaneous compression-encryption of medical images is presented in this paper. A new chaotic map that is highly sensitive to its initial parameters and chaotic in wider range of ... 详细信息
来源: 评论