咨询与建议

限定检索结果

文献类型

  • 123 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 156 篇 工学
    • 92 篇 电气工程
    • 70 篇 计算机科学与技术...
    • 32 篇 信息与通信工程
    • 24 篇 电子科学与技术(可...
    • 24 篇 软件工程
    • 14 篇 仪器科学与技术
    • 10 篇 控制科学与工程
    • 8 篇 机械工程
    • 5 篇 材料科学与工程(可...
    • 3 篇 光学工程
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 25 篇 理学
    • 17 篇 物理学
    • 5 篇 数学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 13 篇 医学
    • 13 篇 临床医学
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 4 篇 艺术学
    • 4 篇 美术学
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学

主题

  • 170 篇 block truncation...
  • 39 篇 image compressio...
  • 18 篇 vector quantizat...
  • 17 篇 image coding
  • 11 篇 error diffusion
  • 10 篇 data compression
  • 10 篇 digital halftoni...
  • 10 篇 color image comp...
  • 9 篇 image authentica...
  • 8 篇 steganography
  • 8 篇 halftoning
  • 8 篇 adaptive quantiz...
  • 7 篇 dot diffusion
  • 7 篇 data hiding
  • 6 篇 ordered ditherin...
  • 6 篇 optimization
  • 6 篇 reversible data ...
  • 6 篇 tamper detection
  • 5 篇 lcd
  • 5 篇 vlsi

机构

  • 10 篇 natl taiwan univ...
  • 5 篇 hanyang univ dep...
  • 4 篇 providence univ ...
  • 4 篇 zhejiang univ sc...
  • 4 篇 providence univ ...
  • 4 篇 univ kerala dept...
  • 3 篇 chinese acad sci...
  • 3 篇 chung yuan chris...
  • 3 篇 natl cheng kung ...
  • 3 篇 natl dong hwa un...
  • 3 篇 jinan univ dept ...
  • 3 篇 hunan first norm...
  • 2 篇 harbin inst tech...
  • 2 篇 department of el...
  • 2 篇 chung yuan chris...
  • 2 篇 jadavpur univ de...
  • 2 篇 providence univ ...
  • 2 篇 department of el...
  • 2 篇 providence univ ...
  • 2 篇 nanjing univ inf...

作者

  • 14 篇 guo jing-ming
  • 11 篇 hu yu-chen
  • 6 篇 liu yun-fu
  • 6 篇 wang jun
  • 5 篇 chong jong-wha
  • 5 篇 lu zhe-ming
  • 4 篇 jing-ming guo
  • 4 篇 chen shih-lun
  • 4 篇 hu yc
  • 4 篇 mathews jayamol
  • 4 篇 nair madhu s.
  • 4 篇 chen wj
  • 4 篇 chen wu-lin
  • 4 篇 tai sc
  • 4 篇 chang cc
  • 3 篇 yang ching-nung
  • 3 篇 lo chun-chi
  • 3 篇 yun-fu liu
  • 3 篇 mitchell hb
  • 3 篇 chang i-cheng

语言

  • 165 篇 英文
  • 5 篇 其他
检索条件"主题词=Block truncation coding"
170 条 记 录,以下是121-130 订阅
排序:
Reversible data hiding in low complexity and high quality compression scheme
收藏 引用
DIGITAL SIGNAL PROCESSING 2012年 第5期22卷 776-785页
作者: Guo, Jing-Ming Tsai, Jia-Jin Natl Taiwan Univ Sci & Technol Dept Elect Engn Taipei Taiwan
Nowadays, most multimedia is stored in compressed bit stream format to save the storage space or transmission time. This study proposes a novel technique for embedding flexible amounts of data in the bit map of the im... 详细信息
来源: 评论
Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5173-5189页
作者: Hengfu Yang Mingfang Jiang Zhichen Gao School of Computer Science Hunan First Normal UniversityChangsha410205China Hunan Provincial Key Laboratory of Informationization Technology for Basic Education Changsha410205China Department of Applied Mathematics and Statistics College of Engineering and Applied SciencesStony Brook UniversityNY 11794USA
Few previous Reversible Visible Watermarking(RVW)schemes have both good transparency and watermark *** adaptive RVW scheme that integrates Total Variation and visual perception in block truncation coding(BTC)compresse... 详细信息
来源: 评论
Partial reversible AMBTC-based secret image sharing with steganography
收藏 引用
DIGITAL SIGNAL PROCESSING 2019年 93卷 22-33页
作者: Wu, Xiaotian Yang, Ching-Nung Jinan Univ Dept Comp Sci Guangzhou Guangdong Peoples R China Natl Dong Hwa Univ Dept Comp Sci & Informat Engn Hualien Taiwan
Existing secret image sharing (SIS) schemes with steganography and authentication are designed for uncompressed images. They cannot be applied to compressed domain. When the cover image is of significance, these schem... 详细信息
来源: 评论
Maximizing the underwater wireless sensor networks' lifespan using BTC and MNP5 compression techniques
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2022年 第9-10期77卷 703-723页
作者: Jawad, Ghufran Ali M. Al-Qurabat, Ali Kadhum M. Idrees, Ali Kadhum Univ Babylon Coll Sci Women Dept Comp Sci Babylon Iraq
The sending/receiving of data is the biggest energy user in the underwater wireless sensor networks (UWSNs). The energy supplied by the battery is the most critical resource in the sensor node affecting UWSN's lif... 详细信息
来源: 评论
A new classified vector quantization based on quadtree
收藏 引用
PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL 1999年 第4期9卷 304-309页
作者: Jiang, K Zhang, QL Fudan Univ ASIC Shanghai 200433 Peoples R China Fudan Univ Syst State Key Lab Shanghai 200433 Peoples R China
A new algorithm of classified vector quantization based on quadtree segmentation is proposed. It can obtain lower bit rate and overcome edge degradation. Simulation results show that the better subjective image qualit... 详细信息
来源: 评论
A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION 2019年 59卷 550-562页
作者: Wu, Xiaotian Chen, Dong Yang, Ching-Nung Yang, Yi-Yun Jinan Univ Dept Comp Sci Guangzhou Guangdong Peoples R China Nanjing Univ Informat Sci & Technol Nanjing Jiangsu Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Natl Dong Hwa Univ Dept Comp Sci & Informat Engn Shoufeng Township Taiwan
Recently, Yang et al. introduced a (k;n) approach called Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) (Yang et al., 2017) to conceal a secret image into n AMBTC shares. However... 详细信息
来源: 评论
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
收藏 引用
IEEE ACCESS 2020年 8卷 106958-106967页
作者: Jiang, Mingfang Yang, Hengfu Hunan First Normal Univ Dept Informat Sci & Engn Changsha 410205 Peoples R China
Advances in cloud computing have aroused many researchers& x2019;interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC... 详细信息
来源: 评论
Fusion of Deep Learning and Compressed Domain Features for Content-Based Image Retrieval
收藏 引用
IEEE TRANSACTIONS ON IMAGE PROCESSING 2017年 第12期26卷 5706-5717页
作者: Liu, Peizhong Guo, Jing-Ming Wu, Chi-Yi Cai, Danlin Huaqiao Univ Coll Engn Quanzhou 362021 Peoples R China Natl Taiwan Univ Sci & Technol Dept Elect Engn Taipei 10607 Taiwan Quanzhou Normal Univ Sch Math & Comp Sci Quanzhou 362000 Peoples R China
This paper presents an effective image retrieval method by combining high-level features from convolutional neural network (CNN) model and low-level features from dot-diffused block truncation coding (DDBTC). The low-... 详细信息
来源: 评论
Tamper detection and image recovery for BTC-compressed images
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2017年 第14期76卷 15435-15463页
作者: Hu, Yu-Chen Choo, Kim-Kwang Raymond Chen, Wu-Lin Providence Univ Dept Comp Sci & Informat Management 200 Chung Chi RdSec 7Taiwan Blvd Taichung 43301 Taiwan Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA Univ South Australia Sch Informat Technol & Math Sci Adelaide SA Australia
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adap... 详细信息
来源: 评论
On the security of a BTC-based-compression image authentication scheme
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2018年 第10期77卷 12979-12989页
作者: Chen, Tzung-Her Chang, Tzu-Ching Natl Chiayi Univ Dept Comp Sci & Informat Engn 300 Univ Rd Chiayi 60004 Taiwan
With image integrity in mind, the sensitivity-of-tamper property of a new image authentication scheme is always one of main concerns. However, to claim integrity guarantee of image authentication techniques is meaning... 详细信息
来源: 评论