咨询与建议

限定检索结果

文献类型

  • 209 篇 会议
  • 45 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 100 篇 计算机科学与技术...
    • 53 篇 信息与通信工程
    • 51 篇 电气工程
    • 45 篇 软件工程
    • 15 篇 光学工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 4 篇 机械工程
    • 4 篇 轻工技术与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 土木工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
  • 95 篇 理学
    • 65 篇 物理学
    • 32 篇 数学
    • 9 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 2 篇 化学
  • 53 篇 医学
    • 50 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 13 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 4 篇 法学
    • 3 篇 社会学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 53 篇 encryption
  • 44 篇 image coding
  • 29 篇 cryptography
  • 27 篇 image compressio...
  • 17 篇 compression
  • 14 篇 image encryption
  • 14 篇 transform coding
  • 13 篇 discrete wavelet...
  • 12 篇 steganography
  • 12 篇 discrete cosine ...
  • 9 篇 data compression
  • 9 篇 watermarking
  • 7 篇 rsa
  • 7 篇 image processing
  • 7 篇 security
  • 7 篇 dct
  • 7 篇 chaos
  • 7 篇 encoding
  • 6 篇 psnr
  • 6 篇 robustness

机构

  • 3 篇 nanchang univ de...
  • 3 篇 beijing univ pos...
  • 3 篇 univ sfax higher...
  • 3 篇 shanghai jiao to...
  • 2 篇 harbin inst tech...
  • 2 篇 national institu...
  • 2 篇 tokyo metropolit...
  • 2 篇 huazhong univ sc...
  • 2 篇 omni dimens netw...
  • 2 篇 school of comput...
  • 2 篇 jinan univ coll ...
  • 2 篇 nanjing univ sci...
  • 2 篇 guangdong provin...
  • 2 篇 hitec univ dept ...
  • 2 篇 vit university v...
  • 2 篇 faculty of engin...
  • 2 篇 department of cs...
  • 2 篇 istanbul technic...
  • 2 篇 南京理工大学
  • 2 篇 atilim universit...

作者

  • 5 篇 ahmad jawad
  • 3 篇 yang jy
  • 3 篇 zhou nanrun
  • 3 篇 tian jw
  • 3 篇 guo l
  • 3 篇 zhou zhihong
  • 3 篇 abdmouleh med ka...
  • 3 篇 pan shumin
  • 3 篇 bouhlel med sali...
  • 3 篇 sun xh
  • 3 篇 li peiya
  • 3 篇 holtz k
  • 3 篇 kiya hitoshi
  • 2 篇 lukin vladimir
  • 2 篇 magli enrico
  • 2 篇 makarichev vikto...
  • 2 篇 kammoun fahmi
  • 2 篇 khalfallah ali
  • 2 篇 ahuja bharti
  • 2 篇 r. sever

语言

  • 242 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"任意字段=Image Compression and Encryption Technologies"
257 条 记 录,以下是81-90 订阅
排序:
A NEW SECURE AND EFFICIENT SCHEME OF ADPCM ENCODER BASED ON CHAOTIC encryption
A NEW SECURE AND EFFICIENT SCHEME OF ADPCM ENCODER BASED ON ...
收藏 引用
1st International Conference on Advanced technologies for Signal and image Processing (ATSIP)
作者: Hamdi, Mimoun Hermassi, Houcemeddine Rhouma, Rhouma Belghith, Safya Ecole Natl Ingeenieurs Tunis Syscom Lab Tunis Tunisia
This paper presents a new secure variant of ADPCM encoders that are adopted by the CCITT as Adaptive Differential Pulse Code Modulation. This version provides encryption and decryption of voice simultaneously with ope... 详细信息
来源: 评论
Blended Vector Matrix On Different Channels Of image encryption With Multi-Level Distinct Frequency Based Chaotic Approach To Prevent Cyber Crimes By Using Affine Transformation  2
Blended Vector Matrix On Different Channels Of Image Encrypt...
收藏 引用
International Conference on Inventive Communication and Computational technologies (ICICCT)
作者: Mathur, Harsh Veenadhari, S. AISECT Univ Bhopal India
Security attacks through Internet has proliferated in recent years. Henceforth, information security is a challenge of very serious global concern of the present time. The protection of image data from unauthorized ac... 详细信息
来源: 评论
Selective Area encryption using Machine Learning Technique
Selective Area Encryption using Machine Learning Technique
收藏 引用
IEEE International Conference on Innovations in Power and Advanced Computing technologies
作者: Kelur, Soumya Kumar, Ranjan H. S. Raju, K. NMAMIT Dept CS&E Karkala Karnataka India
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in... 详细信息
来源: 评论
The design of keyed hash function based on CNN-MD structure
收藏 引用
CHAOS SOLITONS & FRACTALS 2021年 152卷
作者: Wang, Yu Chen, Liquan Wang, Xingyuan Wu, Ge Yu, Kunliang Lu, Tianyu Southeast Univ Sch Cyber Sci & Engn Nanjing 210000 Peoples R China Purple Mt Labs Network & Commun Secur Nanjing 211111 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China
In this paper, we propose a new chaotic neural network called the Merkle-Damgaard (CNN-MD) iterative structure, which we designed from the perspective of resisting attacks, such as length extension, second original im... 详细信息
来源: 评论
Region based representations of image and motion estimation
Region based representations of image and motion estimation
收藏 引用
Conference on image compression and encryption technologies
作者: Du, XX Yang, X Shi, PF Shanghai Jiao Tong Univ Inst Image Proc & Pattern Recognit Shanghai 200030 Peoples R China
In this paper, an image representation method based on arbitrary shaped regions, and motion estimation of the image sequence according to this representation of the image is proposed. In order to avoid over-segmentati... 详细信息
来源: 评论
A novel coding method based on triangular fuzzy vector quantization for noised image
A novel coding method based on triangular fuzzy vector quant...
收藏 引用
Conference on image compression and encryption technologies
作者: Li, YB Jiang, T Lou, Z Harbin Engn Univ 808 HEU Dept Elect Engn Harbin 150001 Peoples R China
In this paper a novel coding method which based on fuzzy vector quantization for polluted image by Gaussian white-noise is presented. By restraining the high frequency component of wavelet image, the noise is signific... 详细信息
来源: 评论
Digital watermarking technique based on integer Harr transforms and visual properties
Digital watermarking technique based on integer Harr transfo...
收藏 引用
Conference on image compression and encryption technologies
作者: Tao, HJ Liu, J Tian, JW Huazhong Univ Sci & Technol Inst Pattern Recognit & Artificial Intelligence State Key Lab Image Proc & Intelligent Control Wuhan 430074 Peoples R China
In this paper. a new method is proposed to hide watermark image based on the discrete integer Haar wavelet transform. This method utilizes excellent properties of the discrete integer Haar wavelet transform and some c... 详细信息
来源: 评论
An Implicit Approach for Visual Data: compression encryption via Singular Value Decomposition, Multiple Chaos and Beta Function  9
An Implicit Approach for Visual Data: Compression Encryption...
收藏 引用
9th IEEE International Conference on Reliability, Infocom technologies and Optimization (Trends and Future Directions), ICRITO 2021
作者: Salunke, Sharad Venkatadri, M. Hashmi, Md. Farukh Ahuja, Bharti Amity University Madhya Pradesh Department of ECE Gwalior India National Institute of Technology Warangal Department of ECE Warangal India National Institute of Technology Raipur Department of IT Raipur India
This paper proposes a digital image compression-encryption scheme based on the theory of singular value decomposition, multiple chaos and Beta function, which uses SVD to compress the digital image and utilizes three ... 详细信息
来源: 评论
A proposal for multispectral image compression methods
A proposal for multispectral image compression methods
收藏 引用
Conference on image compression and encryption technologies
作者: Murni, A Isa, SM Samopa, F Univ Indonesia Fac Comp Sci Jakarta 10002 Indonesia
This paper has proposed two image compression and decompression schemes for multispectral images. Two issues were considered in the proposed methods. The first issue is the possibility of applying the compression proc... 详细信息
来源: 评论
An efficient wavelet based de-blocking algorithm for highly compressed images
An efficient wavelet based de-blocking algorithm for highly ...
收藏 引用
Conference on image compression and encryption technologies
作者: Wu, SH Yan, H Tan, Z City Univ Hong Kong Dept Elect Engn Kowloon Hong Kong Peoples R China
In this paper, a novel post-processing method is proposed in wavelet domain for the suppression of blocking artifacts in compressed images. The novelty of new method is that we can obtain soft-threshold values based o... 详细信息
来源: 评论