咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 医学
    • 22 篇 临床医学
  • 21 篇 工学
    • 16 篇 信息与通信工程
    • 7 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 4 篇 电气工程
    • 2 篇 光学工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 7 篇 理学
    • 5 篇 物理学
    • 1 篇 数学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 军事学

主题

  • 5 篇 steganography
  • 3 篇 jpeg
  • 3 篇 steganalysis
  • 3 篇 security
  • 3 篇 data hiding
  • 2 篇 image enhancemen...
  • 2 篇 video
  • 2 篇 mobile agents
  • 2 篇 manet
  • 2 篇 logarithmic imag...
  • 2 篇 ad hoc network
  • 2 篇 image processing
  • 2 篇 information secu...
  • 2 篇 biometrics
  • 1 篇 support vector m...
  • 1 篇 cancelable templ...
  • 1 篇 performance
  • 1 篇 transport
  • 1 篇 bit
  • 1 篇 personnel traini...

机构

  • 2 篇 univ roma tre ro...
  • 1 篇 mcq inc 1551 for...
  • 1 篇 shanghai univ sc...
  • 1 篇 univ roma tre de...
  • 1 篇 nergal srl i-001...
  • 1 篇 univ toronto on
  • 1 篇 univ texas san a...
  • 1 篇 univ roma tre di...
  • 1 篇 univ new hampshi...
  • 1 篇 bandemar network...
  • 1 篇 usn stennis spac...
  • 1 篇 telefonica movil...
  • 1 篇 cuny coll staten...
  • 1 篇 tampere univ tec...
  • 1 篇 key lab adv disp...
  • 1 篇 atos origin e-28...
  • 1 篇 univ illinois be...
  • 1 篇 tufts univ 161 c...
  • 1 篇 univ s alabama m...
  • 1 篇 tampere univ tec...

作者

  • 5 篇 agaian sos s.
  • 2 篇 egiazarian k.
  • 2 篇 shi xiyu
  • 2 篇 neri a.
  • 2 篇 li fanzhi
  • 2 篇 neri alessandro
  • 2 篇 cherukuri ravind...
  • 2 篇 adams christophe...
  • 2 篇 rodriguez benjam...
  • 2 篇 carli m.
  • 2 篇 maiorana emanuel...
  • 2 篇 agaian sos
  • 2 篇 peterson gilbert...
  • 2 篇 campisi patrizio
  • 1 篇 sifuentes ronnie...
  • 1 篇 panchul aleksand...
  • 1 篇 ren zhen
  • 1 篇 tang ke
  • 1 篇 kazantzidis math...
  • 1 篇 cherukuri ravind...

语言

  • 31 篇 英文
检索条件"任意字段=Mobile Multimedia/Image Processing for Military and Security Applications 2007"
31 条 记 录,以下是1-10 订阅
排序:
mobile multimedia/image processing for military and security applications 2007
Mobile Multimedia/Image Processing for Military and Security...
收藏 引用
mobile multimedia/image processing for military and security applications 2007
The proceedings contain 24 papers. The topics discussed include: recent advances in multiview distributed video coding;super-resolution-based enhancement for real-time ultra-low-bit-rate video coding;signal compressio... 详细信息
来源: 评论
Proceedings of SPIE: mobile multimedia/image processing for military and security applications
Proceedings of SPIE: Mobile Multimedia/Image Processing for ...
收藏 引用
mobile multimedia/image processing for military and security applications
The proceedings contain 25 papers. The topics discussed include: reduced memory JPEG decompression for mobile devices;an efficient real-time video compression algorithm with high feature preserving capability;an imagi... 详细信息
来源: 评论
Data hiding based on Fibonacci-Haar Transform
Data hiding based on Fibonacci-Haar Transform
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Battisti, F. Egiazarian, K. Carli, M. Neri, A. Univ Roma TRE Rome Italy Tampere Univ Technol Tampere Finland
In this contribution, we present a novel technique for imperceptible and robust watermarking of digital images. It is based on the host image 2-th level decomposition using the Fibonacci-Haar Transform (FHT) and on th... 详细信息
来源: 评论
A chaotic cipher Mmohocc and its security analysis
A chaotic cipher Mmohocc and its security analysis
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Zhang, Xiaowen Shu, Li Tang, Ke CUNY Grad Ctr CS Dept New York NY 10021 USA Sichuan Univ Sch Comp Sci Chengdu Peoples R China
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics. The designs of the major components of the cipher are given. Its cryptographic properties of period,... 详细信息
来源: 评论
Secure access control to hidden data by biometric features
Secure access control to hidden data by biometric features
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Cancellaro, J. Carli, M. Egiazarian, K. Neri, A. Univ Roma TRE Dept Appl Elect Via Vasca Navale 84 Rome Italy Tampere Univ Technol Inst Signal Proc Tampere Finland
In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of th... 详细信息
来源: 评论
Impact on routers performance to classify and condition real-time interactive multimedia traffic based on its PHB
Impact on routers performance to classify and condition real...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Alsharif, Salim Al-Khatib, Mazen Tung, Ye Univ S Alabama Mobile AL 36688 USA
This paper presents a new method which enhances the quality-of-service (QoS) and hence the response time and queuing delay of real-time interactive multimedia over the Internet. A service class based on differentiated... 详细信息
来源: 评论
Human visual system based image enhancement
Human visual system based image enhancement
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Wharton, Eric J. Panetta, Karen A. Agaian, Sos S. Tufts Univ Dept Elect & Comp Engn 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio Coll Engn San Antonio TX 78249 USA
This paper presents a method of image enhancement using an adaptive thresholding method based on the human visual system. We utilize a number of different enhancement algorithms applied selectively to the different re... 详细信息
来源: 评论
An Imaging toolbox for smart phone applications
An Imaging toolbox for smart phone applications
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Panchul, Aleksandr Bhupathiraju, Deepthi Agaian, Sos Akopian, David Univ Texas San Antonio 6900 N Loop 1604 W San Antonio TX 78249 USA
The paper presents a Digital image processing toolbox for cellular phones. It is intended for users dealing with imaging algorithms and allows the processing of real images taken by the camera phones. For example, use... 详细信息
来源: 评论
Multi-level signature based biometric authentication using watermarking
Multi-level signature based biometric authentication using w...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Maiorana, Emanuele Campisi, Patrizio Neri, Alessandro Univ Roma Tre Dip Elettr Applicata Via Vasca Navale 84 I-00146 Rome Italy
In the last decade a lot of efforts have been devoted to the development of biometrics-based authentication systems. In this paper we propose a signature-based biometric authentication system, where watermarking techn... 详细信息
来源: 评论
A logarithmic measure of image enhancement
A logarithmic measure of image enhancement
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Wharton, Eric Agaian, Sos Panetta, Karen Tufts Univ 161 Coll Ave Medford MA 02155 USA Univ Texas San Antonio San Antonio TX 78249 USA
image enhancement performance is currently judged subjectively, with no reliable manner of quantifying the results of an enhancement. Current quantitative measures rely on linear algorithms to determine contrast, leav... 详细信息
来源: 评论