咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是61-70 订阅
排序:
Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform
收藏 引用
OPTICS COMMUNICATIONS 2015年 354卷 112-121页
作者: Zhou, Nanrun Yang, Jianping Tan, Changfa Pan, Shumin Zhou, Zhihong Nanchang Univ Dept Elect Informat Engn Nanchang 330031 Peoples R China Beijing Univ Posts & Telecommun Informat Secur Ctr Beijing 100876 Peoples R China Shanghai Jiao Tong Univ Shanghai Key Lab Integrate Adm Technol Informat S Shanghai 200240 Peoples R China
A new discrete fractional random transform based on two circular matrices is designed and a novel double-image encryption-compression scheme is proposed by combining compressive sensing with discrete fractional random... 详细信息
来源: 评论
Research on improved coarseness based image retrieval
Research on improved coarseness based image retrieval
收藏 引用
Conference on image compression and encryption technologies
作者: Sun, XH Yang, JY Guo, L Nanjing Univ Sci & Technol Dept Comp Nanjing Peoples R China
Coarseness is the most fundamental textural feature and has been much investigated since early studies. This paper improves the previous coarseness algorithm on the selection of neighborhood sizes and the calculation ... 详细信息
来源: 评论
Comparative analysis of chaotic and non-chaotic image encryption schemes  10
Comparative analysis of chaotic and non-chaotic image encryp...
收藏 引用
10th International Conference on Emerging technologies, ICET 2014
作者: Younas, M Bin Ahmad, Jawad Department of Electrical Engineering HITEC University Taxila cantt Pakistan
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmiss... 详细信息
来源: 评论
An Unsupervised Learning Approach for Visual Data compression with Chaotic encryption  4
An Unsupervised Learning Approach for Visual Data Compressio...
收藏 引用
4th International Conference on Electrical, Computer and Communication technologies, ICECCT 2021
作者: Ahuja, Bharti Doriya, Rajesh National Institute of Technology Raipur Department of IT Raipur India
The increased demand of multimedia leads to shortage of network bandwidth and memory capacity. As a result, image compression is more significant for decreasing data redundancy, saving storage space and bandwidth. Alo... 详细信息
来源: 评论
Retrieve based on image content using DC-image
Retrieve based on image content using DC-image
收藏 引用
Conference on image compression and encryption technologies
作者: Wang, QH Mo, YL Shanghai Univ Telecommun Sch Shanghai 200072 Peoples R China
In this paper the method is presented to retrieve based on image content in video database using DC-image. The DC-image with the DC coefficient is extracted from DCT domain of image in this video database model. The p... 详细信息
来源: 评论
Embedding strategy of image watermarking in wavelet transform domain
Embedding strategy of image watermarking in wavelet transfor...
收藏 引用
Conference on image compression and encryption technologies
作者: Zhang, ZP Mo, YL Shanghai Univ Dept Commun Engn Shanghai 200072 Peoples R China
In this paper, we study a new strategy to embed watermarks to the scale subband of image wavelet transform domain. The coefficients in scale subband are much bigger than most coefficients in other subband. This means ... 详细信息
来源: 评论
The Implementation of Chaotic encryption Scheme for images
The Implementation of Chaotic Encryption Scheme for Images
收藏 引用
IEEE International Conference on Control, Instrumentation, Communication and Computational technologies (ICCICCT)
作者: Veenus, P. K. Vivek, P. K. Sivasankar, K. Dharun, V. S. Noorul Islam Univ Dept CSE Kumaracoil Tamil Nadu India Noorul Islam Univ Dept IT Kumaracoil Tamil Nadu India Noorul Islam Univ Dept ECE Kumaracoil Tamil Nadu India METS Sch Engn Dept ECE Mala Kerala India
The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is pro... 详细信息
来源: 评论
Multispectral image watermarking based on KLT
Multispectral image watermarking based on KLT
收藏 引用
Conference on image compression and encryption technologies
作者: Zhang, XP Zhang, KW Wang, SZ Shanghai Univ Shanghai 200072 Peoples R China
This paper describes a triple-layered watermarking scheme employing KLT and two layers of discrete cosine transforms, with data shuffled pseudo-randomly prior to the second DCT. In this way, the watermark is impercept... 详细信息
来源: 评论
A watermarking algorithm based on permutation and PDF417 coding
A watermarking algorithm based on permutation and PDF417 cod...
收藏 引用
Conference on image compression and encryption technologies
作者: Ji, Z Xiao, WW Zhang, JH Shenzhen Univ Fac Informat Engn Shenzhen 518060 Peoples R China
This paper represents a new spatial domain digital watermarking method, which can trade off between spatial domain and frequency domain approaches. This technique produces a watermarked image that closely retains the ... 详细信息
来源: 评论
image retrieval by using sub-piece accumulative histogram
Image retrieval by using sub-piece accumulative histogram
收藏 引用
Conference on image compression and encryption technologies
作者: Zhang, LP Ke, XW Shu, H Wuhan Univ Natl Lab Informat Engn Surveying Mapping & Remote Wuhan 430070 Peoples R China
In the algorithms of content-based image retrieval, color has been used widely as the most important visual character. Three key factors for the image retrieval when using color characters are: color expression, color... 详细信息
来源: 评论