咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 5 册 图书
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 8 篇 光学工程
    • 6 篇 测绘科学与技术
    • 5 篇 电子科学与技术(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 1 篇 安全科学与工程
  • 34 篇 理学
    • 30 篇 数学
    • 24 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 17 篇 医学
    • 17 篇 临床医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 9 篇 pattern recognit...
  • 8 篇 image compressio...
  • 7 篇 encryption
  • 4 篇 neural networks
  • 4 篇 image coding
  • 3 篇 data compression
  • 3 篇 adaptive pattern...
  • 2 篇 image encryption
  • 2 篇 arithmetic codin...
  • 2 篇 entropy
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 data encryption ...
  • 1 篇 computer science
  • 1 篇 intraoperative p...
  • 1 篇 symmetric key cr...
  • 1 篇 causality
  • 1 篇 oscillations
  • 1 篇 fractals.
  • 1 篇 jpeg standard

机构

  • 4 篇 university of fl...
  • 4 篇 univ florida dep...
  • 1 篇 univ latvia fac ...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 lebanese amer un...
  • 1 篇 department of el...
  • 1 篇 inst space sci b...
  • 1 篇 shinshu univ fac...
  • 1 篇 department of ma...
  • 1 篇 hohai univ dept ...
  • 1 篇 univ leicester u...
  • 1 篇 indian inst tech...
  • 1 篇 frontier technol...
  • 1 篇 univ massachuset...
  • 1 篇 cidetec ipn aven...
  • 1 篇 sandia natl labs...
  • 1 篇 department of ar...
  • 1 篇 catholic univ am...

作者

  • 6 篇 schmalz mark s.
  • 5 篇 ritter gerhard x...
  • 4 篇 mark steven schm...
  • 2 篇 astola jaakko t.
  • 2 篇 hayden eric
  • 1 篇 gervasi osvaldo
  • 1 篇 hassan gamal a.
  • 1 篇 zanarini m.
  • 1 篇 shen yao
  • 1 篇 xu haiyan
  • 1 篇 mitrea m.
  • 1 篇 hayden eric t.
  • 1 篇 musatenko yurij ...
  • 1 篇 schmalz ms
  • 1 篇 kamble shailesh ...
  • 1 篇 uchill j
  • 1 篇 pujol j
  • 1 篇 kurashov vitalij...
  • 1 篇 bartolini f
  • 1 篇 kalienky d

语言

  • 56 篇 英文
检索条件"任意字段=Mathematics of Data/Image Pattern Coding, Compression, and Encryption with Applications XIII"
56 条 记 录,以下是21-30 订阅
排序:
Bit plane encoding and encryption
收藏 引用
2nd International Conference on pattern Recognition and Machine Intelligence
作者: Yekkala, Anil Madhavan, C. E. Veni Philips Elect India Ltd Bangalore Karnataka India Indian Inst Sci Bangalore Karnataka India
The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand and also tele-medicine has created a great need for multimedia security. One of the important requirements f... 详细信息
来源: 评论
Proceedings of SPIE - mathematics of data/image pattern Recognition, compression, and encryption with applications IX
Proceedings of SPIE - Mathematics of Data/Image Pattern Reco...
收藏 引用
mathematics of data/image pattern Recognition, compression, and encryption with applications IX
The proceedings contain 23 papers. The topics discussed include: biorthogonal wavelets of maximum coding through pseudoframes for subspaces;a skinning prediction scheme for dynamic 3D mesh compression;multi-modal mult... 详细信息
来源: 评论
Maximizing reading: pattern analysis to describe points of gaze
Maximizing reading: pattern analysis to describe points of g...
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Paeglis, Roberts Bagucka, Kristine Sjakste, Nikolajs Lacis, Ivars Latvian Univ Dept Vis Sci 8 Kengaraga Str LV-1063 Riga Latvia Univ Latvia Fac Med LV-1001 Riga Latvia
As people read texts, their points of gaze can be described either as a sequence or as a pattern of dots. If reading fixations are visualized as a pattern and their duration is graphically attributed to the 3(rd) dime... 详细信息
来源: 评论
The synaptic morphological perceptron
The synaptic morphological perceptron
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Myers, Daniel S. Sandia Natl Labs Albuquerque NM 87185 USA
In recent years, several researchers have constructed novel neural network models based on lattice algebra. Because of computational similarities to operations in the system of image morphology, these models are often... 详细信息
来源: 评论
data payload optimality:: a key issue for video watermarking applications
Data payload optimality:: a key issue for video watermarking...
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Mitrea, M. Duta, S. Preteux, F. Vlad, A. GET INT ARTEMIS Dept Evry France POLITEH Univ Fac Elect & Telecommun Bucharest Romania Romanian Acad Res Inst Artificial Intelligence Bucharest Romania
Watermarking aims at enforcing property right for digital video: a mark is imperceptibly - transparently - embedded into original data. The true owner is identified by detecting this mark. The robust watermarking tech... 详细信息
来源: 评论
Proceedings of SPIE mathematics of data/image coding, compression, and encryption VIII, with applications
Proceedings of SPIE Mathematics of Data/Image Coding, Compre...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
The proceedings contain 21 papers. The topics discussed include: a cryptanalysis procedure of the data encryption standard;an adaptive watermarking scheme in the DCT domain;robust video watermarking using additional w... 详细信息
来源: 评论
A cryptanalysis procedure of the data encryption standard
A cryptanalysis procedure of the data encryption standard
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Silva G., Victor Manuel CIDETEC IPN Avenida Te #950 C.P. 08400 Mexico D.F. Mexico
In this paper an attack strategy on the data encryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The atta... 详细信息
来源: 评论
On encryption-compression tradeoff of pre/post-filtered images
On encryption-compression tradeoff of pre/post-filtered imag...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Gurijala, Aparna Khayam, Syed A. Radha, Hayder Deller Jr., J.R. Department of Electrical and Computer Engineering 2120 Engineering Building Michigan State University East Lansing MI 48824
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be... 详细信息
来源: 评论
Double random phase spread spectrum spread space technique for secure parallel optical multiplexing with individual encryption key
Double random phase spread spectrum spread space technique f...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Hennelly, B.M. Javidi, B. Sheridan, J.T. Department of Electronic and Electrical Engineering Faculty of Engineering and Architecture University College Dublin Belfield Dublin 4 Ireland Department of Electrical and Computer Engineering University of Connecticut Storrs CT 06269-2157
A number of methods have been recently proposed in the literature for the encryption of 2-D information using linear optical systems. In particular the double random phase encoding system has received widespread atten... 详细信息
来源: 评论
Fractal based techniques and their applications
Fractal based techniques and their applications
收藏 引用
作者: Lai, Cheung-Ming Hong Kong Polytechnic University (Hong Kong)
学位级别:Ph.D.
The aim of this research is to develop efficient algorithms for fractal image coding, which can be applied in digital image compression, image magnification and image denoising. Fractal image coding can provide a high... 详细信息
来源: 评论