咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 医学
    • 22 篇 临床医学
  • 21 篇 工学
    • 16 篇 信息与通信工程
    • 7 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 4 篇 电气工程
    • 2 篇 光学工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 7 篇 理学
    • 5 篇 物理学
    • 1 篇 数学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 军事学

主题

  • 5 篇 steganography
  • 3 篇 jpeg
  • 3 篇 steganalysis
  • 3 篇 security
  • 3 篇 data hiding
  • 2 篇 image enhancemen...
  • 2 篇 video
  • 2 篇 mobile agents
  • 2 篇 manet
  • 2 篇 logarithmic imag...
  • 2 篇 ad hoc network
  • 2 篇 image processing
  • 2 篇 information secu...
  • 2 篇 biometrics
  • 1 篇 support vector m...
  • 1 篇 cancelable templ...
  • 1 篇 performance
  • 1 篇 transport
  • 1 篇 bit
  • 1 篇 personnel traini...

机构

  • 2 篇 univ roma tre ro...
  • 1 篇 mcq inc 1551 for...
  • 1 篇 shanghai univ sc...
  • 1 篇 univ roma tre de...
  • 1 篇 nergal srl i-001...
  • 1 篇 univ toronto on
  • 1 篇 univ texas san a...
  • 1 篇 univ roma tre di...
  • 1 篇 univ new hampshi...
  • 1 篇 bandemar network...
  • 1 篇 usn stennis spac...
  • 1 篇 telefonica movil...
  • 1 篇 cuny coll staten...
  • 1 篇 tampere univ tec...
  • 1 篇 key lab adv disp...
  • 1 篇 atos origin e-28...
  • 1 篇 univ illinois be...
  • 1 篇 tufts univ 161 c...
  • 1 篇 univ s alabama m...
  • 1 篇 tampere univ tec...

作者

  • 5 篇 agaian sos s.
  • 2 篇 egiazarian k.
  • 2 篇 shi xiyu
  • 2 篇 neri a.
  • 2 篇 li fanzhi
  • 2 篇 neri alessandro
  • 2 篇 cherukuri ravind...
  • 2 篇 adams christophe...
  • 2 篇 rodriguez benjam...
  • 2 篇 carli m.
  • 2 篇 maiorana emanuel...
  • 2 篇 agaian sos
  • 2 篇 peterson gilbert...
  • 2 篇 campisi patrizio
  • 1 篇 sifuentes ronnie...
  • 1 篇 panchul aleksand...
  • 1 篇 ren zhen
  • 1 篇 tang ke
  • 1 篇 kazantzidis math...
  • 1 篇 cherukuri ravind...

语言

  • 31 篇 英文
检索条件"任意字段=Mobile Multimedia/Image Processing for Military and Security Applications 2007"
31 条 记 录,以下是11-20 订阅
排序:
Steganography anomaly detection using simple one-class classification
Steganography anomaly detection using simple one-class class...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Rodriguez, Benjamin M. Peterson, Gilbert L. Agaian, Sos S. Univ Texas Dept Elect & Comp Engn San Antonio TX 78285 USA Univ Texas San Antonio Dept Elect & Comp Engn Multimedia & Mobile Signal Proc Lab San Antonio TX USA
There are several security issues tied to multimedia when implementing the various applications in the cellular phone and wireless industry. One primary concern is the potential ease of implementing a steganography sy... 详细信息
来源: 评论
Switching theory-based steganographic system for JPEG images
Switching theory-based steganographic system for JPEG images
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Cherukuri, Ravindranath C. Agaian, Sos. S. Univ Texas Mobile Multimedia Signal Proc Lab 1 UTSA Circle San Antonio TX 78249 USA
Cellular communications constitute a significant portion of the global telecommunications market. Therefore, the need for secured communication over a mobile platform has increased exponentially. Steganography is an a... 详细信息
来源: 评论
Multiple masks based pixel comparison steganalysis method for mobile Imaging
Multiple masks based pixel comparison steganalysis method fo...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Peterson, Gilbert L. Rodriguez, Benjamin M. Univ Texas Dept Elect & Comp Engn Multimedia & Mobile Signal Proc Lab San Antonio TX 78285 USA Grad Sch Engn & Management Air Force Inst Technol Dept Elect & Comp Engn Wright Patterson AFB OH 45433 USA
Steganalysis has many challenges;which include the accurate and efficient detection of hidden content within digital images. This paper focuses on the development of a new multi pixel comparison method used for the de... 详细信息
来源: 评论
Secure image communication for network applications
Secure image communication for network applications
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Lian, Shiguo Liu, Zhongxuan Wang, Jinwei Ren, Zhen Wang, Haila France Telecom Res & Dev Beijing Beijing 100080 Peoples R China Nanjing Univ Sci & Technol Dept Automat Nanjing PR-210094 Peoples R China
A secure image transmission scheme based on JPEG2000 codec is proposed in this paper, which combines encryption with encoding and is suitable for real-time applications. In this scheme, the sensitive data are self-aut... 详细信息
来源: 评论
Secure steganography designed for mobile platforms
Secure steganography designed for mobile platforms
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Cherukuri, Ravindranath Sifuentes, Ronnie R. Univ Texas MMSP Lab 6900 N Loop 1604 W San Antonio TX 78249 USA
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data ... 详细信息
来源: 评论
The mathematical theory of signal processing and compression-designs
The mathematical theory of signal processing and compression...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Feria, Erlan H. CUNY Coll Staten Isl Dept Engn Sci & Phys Staten Isl NY 10314 USA
The fundamentals of the mathematical theory of signal processing, named processor coding, will be shown to inherently arise as the computational time compression dual of Shannon's mathematical theory of communicat... 详细信息
来源: 评论
A new JPEG-Based steganographic algorithm for mobile devices
A new JPEG-Based steganographic algorithm for mobile devices
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Agaian, Sos S. Cherukuri, Ravindranath Schneider, Erik C. White, Gregory B. Univ Texas Multimedia & Mobile Signal Proc Lab 6900 N Loop 1604 W San Antonio TX 78249 USA Univ Texas Ctr Infrastruct Assurance & secur San Antonio TX 78249 USA
Currently, cellular phones constitute a significant portion of the global telecommunications market. Modem cellular phones offer sophisticated features such as Internet access, on-board cameras, and expandable memory ... 详细信息
来源: 评论
RHINO: Armoured plated networking with intelligent high speed wireless Ad-Hoc capability
RHINO: Armoured plated networking with intelligent high spee...
收藏 引用
Conference on mobile multimedia/image processing, security, and applications
作者: Markarian, Garik Singh, Farid Univ Lancaster Lancaster LA1 4YW England Britannia 2000 Ltd White Waltham England
This paper describes the concept of an intelligent high speed wireless ad-hoc network, which is currently being developed The technology aims at, not replacing any of the existing standards, but aims to complement the... 详细信息
来源: 评论
Log-polar based framework for mobile vehicle tracking with road follower
Log-polar based framework for mobile vehicle tracking with r...
收藏 引用
Conference on mobile multimedia/image processing for military and security applications
作者: Melnyk, Pavlo B. Messner, Richard A. Univ New Hampshire ECE Dept 33 Coll Rd Durham NH 03824 USA
A new computationally efficient framework for vehicle tracking on a mobile platform is proposed. The principal component of the framework is the log-polar transformation applied to video frames captured from a standar... 详细信息
来源: 评论
Solving Data at Rest for the Storage and Retrieval of Files in Ad Hoc Networks
Solving Data at Rest for the Storage and Retrieval of Files ...
收藏 引用
Conference on mobile multimedia/image processing, security, and applications
作者: Knobler, Ron Scheffel, Peter Williams, Jonathan Gaj, Kris Kaps, Jens Peter McQ Inc 1551 Forbes St Fredericksburg VA USA George Mason Univ Fairfax VA 22030 USA
Based on current trends for both military and commercial applications, the use of mobile devices (e. g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file... 详细信息
来源: 评论