咨询与建议

限定检索结果

文献类型

  • 915 篇 会议
  • 98 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 1,014 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 244 篇 工学
    • 134 篇 计算机科学与技术...
    • 105 篇 电气工程
    • 43 篇 软件工程
    • 33 篇 电子科学与技术(可...
    • 33 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 仪器科学与技术
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 2 篇 水利工程
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
  • 40 篇 医学
    • 38 篇 临床医学
  • 38 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 29 篇 理学
    • 11 篇 系统科学
    • 8 篇 物理学
    • 7 篇 数学
    • 2 篇 化学
    • 2 篇 统计学(可授理学、...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 文学
    • 3 篇 新闻传播学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 1,014 篇 data encapsulati...
  • 397 篇 watermarking
  • 201 篇 steganography
  • 195 篇 data mining
  • 190 篇 image coding
  • 172 篇 robustness
  • 149 篇 pixel
  • 131 篇 decoding
  • 124 篇 cryptography
  • 121 篇 data security
  • 116 篇 computer science
  • 107 篇 authentication
  • 97 篇 discrete cosine ...
  • 94 篇 protection
  • 85 篇 data engineering
  • 85 篇 quantization
  • 74 篇 histograms
  • 71 篇 digital images
  • 71 篇 humans
  • 69 篇 internet

机构

  • 14 篇 department of co...
  • 13 篇 school of electr...
  • 13 篇 department of in...
  • 8 篇 department of ec...
  • 7 篇 department of in...
  • 7 篇 department of el...
  • 6 篇 department of el...
  • 6 篇 department of el...
  • 6 篇 hong kong univer...
  • 5 篇 department of in...
  • 5 篇 signal theory an...
  • 5 篇 school of electr...
  • 5 篇 department of el...
  • 5 篇 department of co...
  • 5 篇 graduate school ...
  • 5 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 electronics and ...
  • 5 篇 department of in...
  • 5 篇 department of in...

作者

  • 24 篇 chin-chen chang
  • 16 篇 y.q. shi
  • 13 篇 a.c. kot
  • 13 篇 o.c. au
  • 12 篇 guorong xuan
  • 12 篇 jeng-shyang pan
  • 11 篇 dekun zou
  • 11 篇 ming sun fu
  • 9 篇 a.n. akansu
  • 9 篇 tung-shou chen
  • 9 篇 huijuan yang
  • 9 篇 chin-feng lee
  • 8 篇 jing-ming guo
  • 8 篇 b.s. manjunath
  • 8 篇 zhicheng ni
  • 8 篇 min wu
  • 8 篇 m. ramkumar
  • 8 篇 m. carli
  • 7 篇 k. ramchandran
  • 7 篇 f. perez-gonzale...

语言

  • 1,003 篇 英文
  • 6 篇 其他
  • 5 篇 中文
检索条件"主题词=Data encapsulation"
1014 条 记 录,以下是11-20 订阅
排序:
Comprehensive Review of 2β Decay Half-Lives
arXiv
收藏 引用
arXiv 2025年
作者: Pritychenko, B. Tretyak, V.I. National Nuclear Data Center Brookhaven National Laboratory UptonNY11973-5000 United States Institute for Nuclear Research Kyiv03028 Ukraine INFN Laboratori Nazionali del Gran Sasso AQ Assergi67100 Italy
The double-beta (2β)-decay is the rarest nuclear physics process, and its experimental half-lives (T1/2) exceed the age of the Universe from nine to fourteen orders of magnitude. Double-beta decay was observed, and i... 详细信息
来源: 评论
An Efficiency Firmware Verification Framework for Public Key Infrastructure with Smart Grid and Energy Storage System
arXiv
收藏 引用
arXiv 2025年
作者: Shih, Jhih-Zen Chuang, Cheng-Che Huang, Hong-Sheng Chen, Hsuan-Tung Sun, Hung-Min Department of Computer Science National Tsing Hua University Hsinchu Taiwan Institute of Information Security National Tsing Hua University Hsinchu Taiwan Information and Communications Research Laboratories Industrial Technology Research Institute Hsinchu Taiwan
As a critical component of electrical energy infrastructure, the smart grid system has become indispensable to the energy sector. However, the rapid evolution of smart grids has attracted numerous nation-state actors ... 详细信息
来源: 评论
Refinements of complexity results on type consistency for object-oriented databases
收藏 引用
JOURNAL OF COMPUTER AND SYSTEM SCIENCES 2001年 第4期62卷 537-564页
作者: Ishihara, Y Shimizu, S Seki, H Ito, M Osaka Univ Grad Sch Engn Sci Dept Informat & Math Sci Toyonaka Osaka 5608531 Japan Nara Inst Sci & Technol Grad Sch Informat Sci Nara 6300101 Japan
The method invocation mechanism is one of the essential Features in object-oriented programming languages. This mechanism contributes to data encapsulation and code reuse, but there is a risk of a run-time type error.... 详细信息
来源: 评论
Digital watermarking: Algorithms and applications
收藏 引用
IEEE SIGNAL PROCESSING MAGAZINE 2001年 第4期18卷 33-46页
作者: Podilchuk, CI Delp, EJ Bell Labs Murray Hill NJ 07974 USA Purdue Univ W Lafayette IN 47907 USA
Digital watermarking of multimedia content has become a veryactive research area over the last several years. A general frameworkfor watermark embedding and detection/decoding is presented here alongwith a review of s... 详细信息
来源: 评论
IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network
收藏 引用
IET IMAGE PROCESSING 2022年 第11期16卷 2854-2862页
作者: Khan, Abdullah Ayub Shaikh, Aftab Ahmed Cheikhrouhou, Omar Laghari, Asif Ali Rashid, Mamoon Shafiq, Muhammad Hamam, Habib Sindh Madressatul Islam Univ Fac Comp Sci Karachi Sindh Pakistan Benazir Bhutto Shaheed Univ Lyari Fac Comp Sci & Informat Technol Karachi Sindh Pakistan Taif Univ Collage CIT At Taif Saudi Arabia Vishwakarma Univ Dept Comp Engn Fac Sci & Technol Pune Maharashtra India Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou Peoples R China Univ Moncton Fac Engn Moncton NB Canada
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image-based information hiding has been a significantly imp... 详细信息
来源: 评论
Lossless digital image watermarking in sparse domain by using K-singular value decomposition algorithm
收藏 引用
IET IMAGE PROCESSING 2020年 第6期14卷 1005-1014页
作者: Deeba, Farah Kun, She Dharejo, Fayaz Ali Zhou, Yuanchun Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Sichuan Peoples R China Chinese Acad Sci Univ Chinese Acad Sci Comp Network Informat Ctr Beijing Peoples R China
The crucial hurdle faced by the watermarking technique is to maintain the steadiness corresponding to several attacks while assisting a sufficient level of security. In this study, a robust lossless sparse domain-base... 详细信息
来源: 评论
Biometric-based efficient medical image watermarking in E-healthcare application
收藏 引用
IET IMAGE PROCESSING 2019年 第3期13卷 421-428页
作者: Aparna, Puvvadi Kishore, Polurie Venkata Vijay KL Univ Dept Elect & Commun Engn Vijayawada Andhra Pradesh India
Information hiding is particularly used for security applications to protect the secret message from an unauthorised person. Due to the tremendous development of the Internet and its usage, the issue of protection ove... 详细信息
来源: 评论
High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion
收藏 引用
IET IMAGE PROCESSING 2014年 第11期8卷 647-654页
作者: Tseng, Hsien-Wen Leng, Hui-Shih Chaoyang Univ Technol Dept Informat Management Taichung 41349 Taiwan Changhua Univ Educ Dept Math Changhua 50058 Changhua County Taiwan
data hiding is a technique that is embedding the secret message into the media. In 2010, Chen et al.'s proposed a scheme combined the Canny' edge detector and fuzzy edge detector to increase edge pixels, and e... 详细信息
来源: 评论
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem
收藏 引用
IET IMAGE PROCESSING 2019年 第10期13卷 1705-1713页
作者: Shah, Mohsin Zhang, Weiming Hu, Honggang Dong, Xiaojuan Yu, Nenghai Univ Sci & Technol China Sch Informat Sci & Technol Hefei 230026 Anhui Peoples R China
Advances in signal processing in the encrypted domain and cloud computing have given rise to privacy-preserving technologies. In recent years, reversible data hiding in encrypted images (RDH-EI) has received attention... 详细信息
来源: 评论
Efficient algorithm for very low bit rate embedded image coding
收藏 引用
IET IMAGE PROCESSING 2008年 第2期2卷 59-71页
作者: Moinuddin, A. A. Khan, E. Ghanbari, M. Aligarh Muslim Univ Dept Elect Engn Aligarh Uttar Pradesh India Univ Essex Dept Comp & Elect Syst Colchester CO4 3SQ Essex England
The authors propose an embedded wavelet-based image coding algorithm that exploits both the inter- and intra-subband correlations among the wavelet coefficients. The proposed coding algorithm is based on spatial orien... 详细信息
来源: 评论