咨询与建议

限定检索结果

文献类型

  • 210 篇 会议
  • 44 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 100 篇 计算机科学与技术...
    • 54 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 14 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 94 篇 理学
    • 64 篇 物理学
    • 31 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 54 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 15 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 13 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 7 篇 robustness
  • 6 篇 psnr

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 8 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是71-80 订阅
排序:
Higher-Order Cellular Automata Generated Symmetry-Protected Topological Phases and Detection Through Multi Point Strange Correlators
收藏 引用
PRX Quantum 2024年 第3期5卷 030342页
作者: Jie-Yu Zhang Meng-Yuan Li Peng Ye Guangdong Provincial Key Laboratory of Magnetoelectric Physics and Devices State Key Laboratory of Optoelectronic Materials and Technologies School of Physics Sun Yat-sen University Guangzhou 510275 China
In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications, such as secre... 详细信息
来源: 评论
Combination of neural network and advanced encryption and decryption technique is used for digital image watermarking
Combination of neural network and advanced encryption and de...
收藏 引用
5th International Symposium on Intelligent Systems technologies and Applications (ISTA) / International Conference on Applied Soft Computing and Communication Networks (ACN)
作者: Gonge, Sudhanshu Suhas Vishwakarma Inst Technol Dept Comp Engn Pune Maharashtra India
The computer system represents data in various format viz (i) Audio, (ii) Video, (iii) Text, (iv) Message, and (v) image format. There are many ways through which, data can be easily transferred. The process of transf... 详细信息
来源: 评论
Low power area efficient improved dwt and aes architectures for secure image coding  1
收藏 引用
1st International Conference on Advances in Electrical and Computer technologies, ICAECT 2019
作者: Ravi, Renjith V. Subramaniam, Kamalraj Prasanna Venkatesan, G.K.D. Department of Electronics and Communication Engineering M.E.A Engineering College MalappuramKerala India Department of Electronics and Communication Engineering Faculty of Engineering Karpagam Academy of Higher Eduction CoimbatoreTamil Nadu India Faculty of Engineering Karpagam Academy of Higher Eduction CoimbatoreTamil Nadu India
This paper unfolds the development of an HDL model on the ASIC platform for the quicker and safer transmission of image data. Secure image encoding was facilitated by the DWT through image compression and AES through ... 详细信息
来源: 评论
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1435-1452页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow100031Poland
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati... 详细信息
来源: 评论
21st International Conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
21st International Conference on Parallel and Distributed Co...
收藏 引用
21st International Conference on Parallel and Distributed Computing, Applications, and technologies, PDCAT 2020
The proceedings contain 35 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications, and technologies. The topics include: On the Non-ergodic Convergence Rate of the Directed...
来源: 评论
无线数字图像通信关键技术研究
收藏 引用
移动信息 2023年 第10期45卷 4-6页
作者: 于德璘 91550部队 辽宁大连116000
文中研究了无线数字图像通信关键技术,采用理论结合实践的方法,立足无线数字图像通信的概念和技术特点,分析了无线数字图像通信技术的研究现状,并分析了实现无线数字图像通信的关键技术以及无线数字图像传输过程中的差错控制方法。研究... 详细信息
来源: 评论
Optical Compressive Imaging technologies for Space Big Data
收藏 引用
IEEE TRANSACTIONS ON BIG DATA 2020年 第3期6卷 430-442页
作者: Coluccia, Giulio Lastri, Cinzia Guzzi, Donatella Magli, Enrico Nardino, Vanni Palombi, Lorenzo Pippi, Ivan Raimondi, Valentina Ravazzi, Chiara Garoi, Florin Coltuc, Daniela Vitulli, Raffaele Marchi, Alessandro Zuccaro Politecn Torino Dept Elect & Telecommun I-10129 Turin Italy Natl Res Council IFAC CNR Nello Carrara Inst Appl Phys I-50019 Sesto Fiorentino Italy Natl Res Council IEIIT CNR Inst Elect Comp & Telecommun Engn I-10129 Turin Italy Natl Inst Laser Plasma & Radiat Phys Magurele 077126 Romania Univ Politehn Bucuresti Res Ctr Spatial Informat Bucharest 060042 Romania European Space Agcy ESA ESTEC NL-2201 AZ Noordwijk Netherlands
The increasing amount of data generated by space applications poses several challenges due to limited resources available onboard: power, memory, computation, data rate. In this paper, we propose Compressed Sensing (C... 详细信息
来源: 评论
Higher-Order Cellular Automata Generated Symmetry-Protected Topological Phases and Detection Through Multi-Point Strange Correlators
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Jie-Yu Li, Meng-Yuan Ye, Peng Guangdong Provincial Key Laboratory of Magnetoelectric Physics and Devices State Key Laboratory of Optoelectronic Materials and Technologies School of Physics Sun Yat-sen University Guangzhou510275 China
In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications such as secret... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted image Based on Flipping MSB encryption Process  20
Reversible Data Hiding in Encrypted Image Based on Flipping ...
收藏 引用
6th International Conference on Frontiers of Educational technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020
作者: Weng, Chi-Yao Yang, Cheng-Hsing Hsu, Guang-Yih Chen, Rong-Jaye Li, Chun-Ta Department of Computer Science National Pingtung University Pingtung Taiwan Department of Computer Science National Chiao Tung University Hsinchu Taiwan Department of Information Management Tainan University of Technology Tainan Taiwan
A novel reversible data hiding method based on vacating room for specific encryption process in encrypted image is proposed by Huang and Wang in 2020. In their method, they applied pixel value expansion approach to va... 详细信息
来源: 评论
image compression-encryption Scheme Based on 2D DWT, SPIHT and Qi Hyper-chaos
Image Compression-Encryption Scheme Based on 2D DWT, SPIHT a...
收藏 引用
27th Southern African Universities Power Engineering Conference (SAUPEC) / 11th Robotics and Mechatronics Conference of South Africa (RobMech) / 29th Annual Symposium of Pattern-Recognition-Association-of-South-Africa (PRASA)
作者: Lisungu, Tresor Oteko Sumbwanyambe, Mbuyu Univ South Africa Dept Elect & Min Engn Johannesburg South Africa
With an ever increase usage of multi-media content, such audio, image and video across networks, image compression and security of content has become almost a need to users who would want to transmit over such network... 详细信息
来源: 评论