咨询与建议

限定检索结果

文献类型

  • 25 篇 会议
  • 5 册 图书
  • 2 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 19 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 7 篇 光学工程
    • 7 篇 信息与通信工程
    • 5 篇 测绘科学与技术
    • 4 篇 电子科学与技术(可...
    • 3 篇 电气工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 控制科学与工程
  • 19 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 9 篇 医学
    • 9 篇 临床医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 8 篇 image compressio...
  • 4 篇 encryption
  • 3 篇 data compression
  • 2 篇 image encryption
  • 2 篇 arithmetic codin...
  • 2 篇 pattern recognit...
  • 2 篇 cryptography
  • 1 篇 data encryption ...
  • 1 篇 symmetric key cr...
  • 1 篇 fractals.
  • 1 篇 jpeg standard
  • 1 篇 lattice independ...
  • 1 篇 imaging systems
  • 1 篇 morphological ne...
  • 1 篇 variable model
  • 1 篇 algorithm develo...
  • 1 篇 electronics
  • 1 篇 information theo...
  • 1 篇 lattice associat...
  • 1 篇 digital watermar...

机构

  • 4 篇 university of fl...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 shinshu univ fac...
  • 1 篇 indian inst tech...
  • 1 篇 cidetec ipn aven...
  • 1 篇 univ calif san d...
  • 1 篇 department of el...
  • 1 篇 tel aviv univ fa...
  • 1 篇 tampere universi...
  • 1 篇 inaoe dept opt p...
  • 1 篇 department of el...
  • 1 篇 autosophy ca 941...
  • 1 篇 univ siena dept ...
  • 1 篇 dept. of compute...
  • 1 篇 alenia spazio i-...
  • 1 篇 informatics rese...
  • 1 篇 univ autonoma ba...
  • 1 篇 univ florida dep...

作者

  • 4 篇 mark steven schm...
  • 2 篇 schmalz mark s.
  • 1 篇 astola jaakko t.
  • 1 篇 musatenko yurij ...
  • 1 篇 schmalz ms
  • 1 篇 uchill j
  • 1 篇 pujol j
  • 1 篇 kurashov vitalij...
  • 1 篇 bartolini f
  • 1 篇 kalienky d
  • 1 篇 silva g. victor ...
  • 1 篇 cappellini v
  • 1 篇 eckhouse v
  • 1 篇 ritter gerhard x...
  • 1 篇 belal ahmed a.
  • 1 篇 soloveyko olexan...
  • 1 篇 junior barrera
  • 1 篇 khayam syed a.
  • 1 篇 pathak s
  • 1 篇 deller jr. j.r.

语言

  • 33 篇 英文
检索条件"任意字段=Mathematics of Data/Image Coding, Compression, and Encryption VI, with Applications"
33 条 记 录,以下是21-30 订阅
排序:
Benchmarking techniques for evaluation of compression transform performance in ATR applications
Benchmarking techniques for evaluation of compression transf...
收藏 引用
7th Conference on mathematics of data/image coding, compression, and encryption
作者: Schmalz, MS Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, militar... 详细信息
来源: 评论
Lossless data compression in the space applications
Lossless data compression in the space applications
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Lanza, P Alenia Spazio I-10146 Turin Italy
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorit... 详细信息
来源: 评论
Proceedings of SPIE: mathematics of data/image coding, compression, and encryption V, with Application
Proceedings of SPIE: Mathematics of Data/Image Coding, Compr...
收藏 引用
mathematics of data/image coding, compression, and encryption V, with applications
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/image coding, compression, and encryption and security, remote sensing and communication and compressive ... 详细信息
来源: 评论
Dynamic sub-wavelength encryption
Dynamic sub-wavelength encryption
收藏 引用
Conference on mathematics of data/image coding, compression and encryption V, with applications
作者: Eckhouse, V Zalevsky, Z Mendlovic, D Tel Aviv Univ Fac Engn Dept Phys Elect IL-69978 Tel Aviv Israel
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the devic... 详细信息
来源: 评论
Generation of lattice independent vector sets for pattern recognition applications
Generation of lattice independent vector sets for pattern re...
收藏 引用
Conference on mathematics of data/image Pattern Recongnition, compression, coding, and encryption X, with applications
作者: Urcid-S., Gonzalo Valdiviezo-N., Juan-Carlos INAOE Dept Opt Puebla 72000 Mexico
Lattice independence and strong lattice independence of a set of pattern vectors are fundamental mathematical proper-ties that lie at the core of pattern recognition applications based on lattice theory. Specifically,... 详细信息
来源: 评论
Uniform quantization error for Laplacian sources with applications to JPEG standard
Uniform quantization error for Laplacian sources with applic...
收藏 引用
Conference on mathematics of data/image coding, compression, and encryption
作者: Minguillón, J Pujol, J Univ Autonoma Barcelona Bellaterra Spain
In this paper we propose a novel method for computing JPEG quantization matrices based on desired mean square error, avoiding the classical trial and error procedure. First, we use a relationship between a Laplacian s... 详细信息
来源: 评论
A cryptanalysis procedure of the data encryption standard
A cryptanalysis procedure of the data encryption standard
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
作者: Silva G., victor Manuel CIDETEC IPN Avenida Te #950 C.P. 08400 Mexico D.F. Mexico
In this paper an attack strategy on the data encryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The atta... 详细信息
来源: 评论
On encryption-compression tradeoff of pre/post-filtered images
On encryption-compression tradeoff of pre/post-filtered imag...
收藏 引用
mathematics of data/image coding, compression, and encryption viII, with applications
作者: Gurijala, Aparna Khayam, Syed A. Radha, Hayder Deller Jr., J.R. Department of Electrical and Computer Engineering 2120 Engineering Building Michigan State University East Lansing MI 48824
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be... 详细信息
来源: 评论
Watermarking-based protection of remote sensing images: requirements and possible solutions
Watermarking-based protection of remote sensing images: requ...
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Barni, M Bartolini, F Cappellini, V Magli, E Olmo, G Univ Siena Dept Informat Engn I-53100 Siena Italy
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and... 详细信息
来源: 评论
Comparison of wavelet and Karhunen-Loeve transforms in video compression applications
Comparison of wavelet and Karhunen-Loeve transforms in video...
收藏 引用
Proceedings of the 1999 mathematics of data/image coding, compression, and encryption II
作者: Musatenko, Yurij S. Soloveyko, Olexandr M. Kurashov, vitalij N. Kyiv Univ Kyiv Ukraine
In the paper we present comparison of three advanced techniques for video compression. Among them 3D Embedded Zerotree Wavelet (EZW) coding, recently suggested Optimal image coding using Karhunen-Loeve (KL) transform ... 详细信息
来源: 评论