咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 8 册 图书
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 8 篇 光学工程
    • 6 篇 测绘科学与技术
    • 5 篇 电子科学与技术(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 1 篇 安全科学与工程
  • 34 篇 理学
    • 30 篇 数学
    • 24 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 17 篇 医学
    • 17 篇 临床医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 9 篇 pattern recognit...
  • 8 篇 image compressio...
  • 7 篇 encryption
  • 4 篇 neural networks
  • 4 篇 image coding
  • 3 篇 data compression
  • 3 篇 adaptive pattern...
  • 2 篇 image encryption
  • 2 篇 applications of ...
  • 2 篇 arithmetic codin...
  • 2 篇 entropy
  • 2 篇 functional analy...
  • 2 篇 computer imaging...
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 data encryption ...
  • 1 篇 computer science
  • 1 篇 intraoperative p...
  • 1 篇 symmetric key cr...
  • 1 篇 causality

机构

  • 4 篇 university of fl...
  • 4 篇 univ florida dep...
  • 1 篇 univ latvia fac ...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 lebanese amer un...
  • 1 篇 department of el...
  • 1 篇 inst space sci b...
  • 1 篇 shinshu univ fac...
  • 1 篇 department of ma...
  • 1 篇 hohai univ dept ...
  • 1 篇 department of ma...
  • 1 篇 univ leicester u...
  • 1 篇 indian inst tech...
  • 1 篇 frontier technol...
  • 1 篇 univ massachuset...
  • 1 篇 cidetec ipn aven...
  • 1 篇 sandia natl labs...
  • 1 篇 department of ar...

作者

  • 6 篇 schmalz mark s.
  • 5 篇 ritter gerhard x...
  • 4 篇 mark steven schm...
  • 2 篇 astola jaakko t.
  • 2 篇 hayden eric
  • 1 篇 gervasi osvaldo
  • 1 篇 hassan gamal a.
  • 1 篇 zanarini m.
  • 1 篇 shen yao
  • 1 篇 xu haiyan
  • 1 篇 mitrea m.
  • 1 篇 hayden eric t.
  • 1 篇 musatenko yurij ...
  • 1 篇 schmalz ms
  • 1 篇 kamble shailesh ...
  • 1 篇 uchill j
  • 1 篇 pujol j
  • 1 篇 kurashov vitalij...
  • 1 篇 bartolini f
  • 1 篇 kalienky d

语言

  • 59 篇 英文
检索条件"任意字段=Mathematics of Data/Image Pattern Coding, Compression, and Encryption with Applications XIII"
59 条 记 录,以下是41-50 订阅
排序:
mathematics of data/image coding, compression, and encryption with applications XII
Mathematics of Data/Image Coding, Compression, and Encryptio...
收藏 引用
mathematics of data/image coding, compression, and encryption with applications XII
The proceedings contain 26 papers. The topics discussed include: object/image relations in full and weak perspective and 3D reconstruction;the design of wavelets for limited-angle tomographic hyperspectral imaging sys...
来源: 评论
data payload optimality:: a key issue for video watermarking applications
Data payload optimality:: a key issue for video watermarking...
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Mitrea, M. Duta, S. Preteux, F. Vlad, A. GET INT ARTEMIS Dept Evry France POLITEH Univ Fac Elect & Telecommun Bucharest Romania Romanian Acad Res Inst Artificial Intelligence Bucharest Romania
Watermarking aims at enforcing property right for digital video: a mark is imperceptibly - transparently - embedded into original data. The true owner is identified by detecting this mark. The robust watermarking tech... 详细信息
来源: 评论
mathematics Of data/image coding, compression, And encryption Vii, With applications (Proceedings of S P I E)
Mathematics Of Data/image Coding, Compression, And Encryptio...
收藏 引用
2004年
来源: 评论
Double random phase spread spectrum spread space technique for secure parallel optical multiplexing with individual encryption key
Double random phase spread spectrum spread space technique f...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Hennelly, B.M. Javidi, B. Sheridan, J.T. Department of Electronic and Electrical Engineering Faculty of Engineering and Architecture University College Dublin Belfield Dublin 4 Ireland Department of Electrical and Computer Engineering University of Connecticut Storrs CT 06269-2157
A number of methods have been recently proposed in the literature for the encryption of 2-D information using linear optical systems. In particular the double random phase encoding system has received widespread atten... 详细信息
来源: 评论
mathematics and applications of data/image coding, compression and encryption
Mathematics and Applications of Data/Image Coding, Compressi...
收藏 引用
2000年
作者: Mark Steven Schmalz
来源: 评论
mathematics of data/image coding, compression and encryption IV, with applications
Mathematics of Data/Image Coding, Compression and Encryption...
收藏 引用
2001年
作者: Mark Steven Schmalz
来源: 评论
mathematics of data/image coding, compression, and encryption Vi, With applications (Proceedings of Spie, 5208)
Mathematics of Data/Image Coding, Compression, and Encryptio...
收藏 引用
2004年
作者: Mark Steven Schmalz
来源: 评论
Fractal based techniques and their applications
Fractal based techniques and their applications
收藏 引用
作者: Lai, Cheung-Ming Hong Kong Polytechnic University (Hong Kong)
学位级别:Ph.D.
The aim of this research is to develop efficient algorithms for fractal image coding, which can be applied in digital image compression, image magnification and image denoising. Fractal image coding can provide a high... 详细信息
来源: 评论
SECOND INTERNATIONAL CONFERENCE ON image PROCESSING AND ITS applications.
SECOND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ITS ...
收藏 引用
Second International Conference on image Processing and Its applications.
作者: Anon
This conference proceedings consists of 54 papers. The main subjects are enhancement and restoration, image coding, industrial applications, medical applications, multidimensional image processing techniques, hardware... 详细信息
来源: 评论
2D-encryption mode
2D-encryption mode
收藏 引用
mathematics of data/image coding, compression, and encryption V, with applications
作者: Abdel-Gawad, Moez A. Belal, Ahmed A. Informatics Research Institute Mubarak City for Scientific Research Alexandria Egypt Dept. of Computer Science Faculty of Engineering Alexandria Egypt
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop... 详细信息
来源: 评论