咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 1 册 图书

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 电气工程
  • 6 篇 理学
    • 4 篇 物理学
    • 3 篇 数学
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 2 篇 image encryption
  • 2 篇 image compressio...
  • 1 篇 fuzzy sets
  • 1 篇 data security
  • 1 篇 video coding
  • 1 篇 algorithm develo...
  • 1 篇 videoconference
  • 1 篇 electronics
  • 1 篇 data compression
  • 1 篇 optimization
  • 1 篇 digital watermar...
  • 1 篇 data encryption
  • 1 篇 multimedia
  • 1 篇 arithmetic codin...
  • 1 篇 image coding
  • 1 篇 entropy coding
  • 1 篇 visualization
  • 1 篇 image edge analy...
  • 1 篇 pieceivise linea...
  • 1 篇 remote sensing

机构

  • 1 篇 dept. of electri...
  • 1 篇 shinshu univ fac...
  • 1 篇 shinshu univ fac...
  • 1 篇 beijing univ tec...
  • 1 篇 amer intercont u...
  • 1 篇 university of fl...
  • 1 篇 univ siena dept ...
  • 1 篇 univ florida dep...
  • 1 篇 iit dept elect e...
  • 1 篇 queensland univ ...

作者

  • 2 篇 tanaka k
  • 1 篇 jia jia
  • 1 篇 schmalz ms
  • 1 篇 bartolini f
  • 1 篇 yan lei
  • 1 篇 cappellini v
  • 1 篇 mark steven schm...
  • 1 篇 ishibashi h
  • 1 篇 society for indu...
  • 1 篇 magli e
  • 1 篇 madasu vamsi kri...
  • 1 篇 olmo g
  • 1 篇 vasikarla shanta...
  • 1 篇 miyamoto m
  • 1 篇 barni m
  • 1 篇 hanmandlu madasu
  • 1 篇 sugimura t
  • 1 篇 cai mian
  • 1 篇 belfore ii lee a...

语言

  • 9 篇 英文
检索条件"任意字段=Proceedings of the 1999 Mathematics of Data/Image Coding, Compression, and Encryption II"
9 条 记 录,以下是1-10 订阅
排序:
mathematics of data/image coding, compression and encryption ii
Mathematics of Data/Image Coding, Compression and Encryption...
收藏 引用
1999年
作者: Society For Indust Mark Steven Schmalz
来源: 评论
Truncated baker transformation and its extension to image encryption
Truncated baker transformation and its extension to image en...
收藏 引用
Conference on mathematics of data/image coding, compression, and encryption ii
作者: Miyamoto, M Tanaka, K Sugimura, T Shinshu Univ Fac Engn Wakasato Nagano 3808553 Japan
This paper presents a new truncated Baker transformation with a finite precision and extends it to an efficient image encryption scheme. The truncated Baker transformation uses the quantization error as a secret key, ... 详细信息
来源: 评论
data encryption scheme with extended artithmetic coding
Data encryption scheme with extended artithmetic coding
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Ishibashi, H Tanaka, K Shinshu Univ Fac Engn Nagano 3808553 Japan
In this work, we extend arithmetic coding and present a data encryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact... 详细信息
来源: 评论
A Novel Approach for Fuzzy Edge Detection Using Type ii Fuzzy Sets
A Novel Approach for Fuzzy Edge Detection Using Type II Fuzz...
收藏 引用
Conference on mathematics of data/image Pattern Recognition, compression, coding and encryption X, with Applications XI
作者: Madasu, Vamsi Krishna Hanmandlu, Madasu Vasikarla, Shantaram Queensland Univ Technol Sch Engn Syst Brisbane Qld 4001 Australia IIT Dept Elect Engn Delhi India Amer InterCont Univ Sch Informat Technol Los Angeles CA 90066 USA
A novel approach is presented for edge detection using the USAN area feature at a pixel, since the USAN area characterizes the structure of the edge present in the neighborhood of a pixel. Next, Gaussian edge detector... 详细信息
来源: 评论
Power- and space-efficient image computation with compressive processing. 1. Background and theory
Power- and space-efficient image computation with compressiv...
收藏 引用
Conference on mathematics and Applications of data/image coding, compression, and encryption iiI
作者: Schmalz, MS Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
Surveillance imaging applications on small autonomous imaging platforms present challenges of highly constrained power supply and form factor, with potentially demanding specifications for target detection and recogni... 详细信息
来源: 评论
Watermarking-based protection of remote sensing images: requirements and possible solutions
Watermarking-based protection of remote sensing images: requ...
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Barni, M Bartolini, F Cappellini, V Magli, E Olmo, G Univ Siena Dept Informat Engn I-53100 Siena Italy
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and... 详细信息
来源: 评论
An adaptive predictor for efficient lossless coding of FTS inteferograms
An adaptive predictor for efficient lossless coding of FTS i...
收藏 引用
mathematics of data/image coding, compression, and encryption V, with Applications
作者: Belfore ii, Lee A. Dept. of Electrical and Comp. Eng. Old Dominion University Norfolk VA 23529 United States
Interferograms obtained from Fourier transform spectrometers (FTS) can be used to obtain high resolution optical spectral measurements. Accompanying high resolution spectra is the resulting large date volumes. This pa... 详细信息
来源: 评论
proceedings of SPIE: mathematics of data/image Pattern Recognition, compression, and encryption with Applications XI
Proceedings of SPIE: Mathematics of Data/Image Pattern Recog...
收藏 引用
mathematics of data/image Pattern Recognition, compression, and encryption with Applications XI
The proceedings contain 22 papers. The topics discussed include: data compression in emitter location systems via sensor pairing and selection;impact of wavelet types on image data characteristics during compression;o...
来源: 评论
An H.264 video encryption algorithm based on entropy coding
An H.264 video encryption algorithm based on entropy coding
收藏 引用
3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing
作者: Cai Mian Jia Jia Yan Lei Beijing Univ Technol Sch Elect Informat & Control Engn Beijing 100022 Peoples R China
H.264 video coding standard supports a broad range of application, and how to guarantee its security has already become an urgent problem. In this paper, we propose a, video encryption algorithm for H.264, which combi... 详细信息
来源: 评论