咨询与建议

限定检索结果

文献类型

  • 97 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 123 篇 工学
    • 88 篇 计算机科学与技术...
    • 64 篇 电气工程
    • 25 篇 信息与通信工程
    • 15 篇 软件工程
    • 11 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 石油与天然气工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 网络空间安全
  • 39 篇 理学
    • 30 篇 数学
    • 6 篇 生物学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 14 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 138 篇 huffman code
  • 16 篇 data compression
  • 11 篇 redundancy
  • 10 篇 compression
  • 9 篇 image compressio...
  • 6 篇 decoding
  • 5 篇 golomb code
  • 5 篇 prefix code
  • 5 篇 minimum-redundan...
  • 5 篇 arithmetic code
  • 5 篇 average redundan...
  • 5 篇 codes
  • 5 篇 encoding
  • 5 篇 source coding
  • 4 篇 adaptive compres...
  • 4 篇 prefix-free code
  • 4 篇 huffman codes
  • 3 篇 jpeg
  • 3 篇 decoding algorit...
  • 3 篇 coding

机构

  • 5 篇 isfahan univ tec...
  • 3 篇 bar ilan univ de...
  • 2 篇 chinese acad sci...
  • 2 篇 univ tokyo dept ...
  • 2 篇 univ victoria de...
  • 2 篇 isfahan univ tec...
  • 2 篇 tokyo inst techn...
  • 2 篇 univ maribor fac...
  • 2 篇 univ chinese aca...
  • 2 篇 univ victoria de...
  • 2 篇 univ melbourne m...
  • 2 篇 ariel univ comp ...
  • 2 篇 purdue univ dept...
  • 1 篇 qualcomm res lab...
  • 1 篇 univ autonoma ba...
  • 1 篇 mid sweden univ ...
  • 1 篇 department of co...
  • 1 篇 at and t bell la...
  • 1 篇 shanghai univ ke...
  • 1 篇 jadavpur univ de...

作者

  • 6 篇 khosravifard moh...
  • 5 篇 shapira dana
  • 5 篇 klein shmuel t.
  • 5 篇 gulliver t. aaro...
  • 4 篇 moffat a
  • 4 篇 moffat alistair
  • 3 篇 yang cheng-hsing
  • 3 篇 narimani hamed
  • 3 篇 turpin a
  • 3 篇 chung kl
  • 2 篇 lin yk
  • 2 篇 szpankowski w
  • 2 篇 yamamoto hirosuk...
  • 2 篇 triesch eberhard
  • 2 篇 muhammad azam sh...
  • 2 篇 honda junya
  • 2 篇 yi xiaowei
  • 2 篇 kheradmand shima
  • 2 篇 iwakiri munetosh...
  • 2 篇 huang shu-chien

语言

  • 128 篇 英文
  • 10 篇 其他
检索条件"主题词=Huffman code"
138 条 记 录,以下是1-10 订阅
排序:
AHCM: Adaptive huffman code Mapping for Audio Steganography Based on Psychoacoustic Model
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2019年 第8期14卷 2217-2231页
作者: Yi, Xiaowei Yang, Kun Zhao, Xianfeng Wang, Yuntao Yu, Haibo Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Baidu Autonomous Driving Business Unit Res & Dev Beijing 100094 Peoples R China
Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive huffman code mapping (AHCM) framework for obtaining hi... 详细信息
来源: 评论
LOCAL REDUNDANCY AND PROGRESSIVE BOUNDS ON THE REDUNDANCY OF A huffman code
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 1991年 第3期37卷 687-691页
作者: YEUNG, RW AT and T Bell Laboratories Inc. Holmdel NJ USA
The concept of local redundancy is introduced and shown that it is a simple but powerful tool for understanding the redundancy of a prefix code. Based on this concept, the redundancy theorem, which gives lower bounds ... 详细信息
来源: 评论
A proposal of digital rights management based on incomplete cryptography using invariant huffman code length feature
收藏 引用
MULTIMEDIA SYSTEMS 2014年 第2期20卷 127-142页
作者: Ta Minh Thanh Iwakiri, Munetoshi Tokyo Inst Technol Dept Comp Sci Meguro Ku Tokyo 1528552 Japan Le Quy Don Tech Univ Dept Network Secur Hanoi Vietnam Natl Def Acad Dept Comp Sci Yokosuka Kanagawa 2398686 Japan
Digital rights management (DRM) system is a promising technique to allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieve... 详细信息
来源: 评论
Hierarchical transmission of huffman code using multi-code/multi-rate DS/SS modulation with appropriate power control
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 1998年 第12期E81B卷 2283-2289页
作者: Makido, S Yamazato, T Katayama, M Ogawa, A Nagoya Univ Grad Sch Engn Nagoya Aichi 4648603 Japan
For transmission of video signals, it is important that the system allows a certain degree of flexibility in bit rate as well as quality, depending upon the requirements of media and channel conditions. In this paper,... 详细信息
来源: 评论
Optimality of huffman code in the Class of 1-Bit Delay Decodable codes
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY 2022年 第4期3卷 616-625页
作者: Hashimoto, Kengo Iwata, Ken-ichi Univ Fukui Grad Sch Engn Fukui 9108507 Japan
For a given independent and identically distributed (i.i.d.) source, huffman code achieves the optimal average codeword length in the class of instantaneous codes with a single code table. However, it is known that th... 详细信息
来源: 评论
A NOTE ON THE COMPETITIVE OPTIMALITY OF THE huffman code
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 1992年 第2期38卷 436-439页
作者: FEDER, M Department of Electrical Engineering-Systems Faculty Engineering Tel-Aviv University Tel-Aviv Israel
It is known that a bound on the probability that the length of any source code will be shorter than the self information by gamma-bits can be obtained using a Chebychev-type argument. From this bound, one can establis... 详细信息
来源: 评论
Incomplete Cryptography Method Using Invariant huffman code Length to Digital Rights Management
Incomplete Cryptography Method Using Invariant Huffman Code ...
收藏 引用
26th IEEE International Conference on Advanced Information Networking and Applications (AINA)
作者: Iwakiri, Munetoshi Ta Minh Thanh Natl Def Acad Dept Comp Sci 1-10-20 Hashirimizu Yokosuka Kanagawa 2398686 Japan Tokyo Inst Technol Dept Comp Sci Meguro Ku Tokyo 1528552 Japan
This paper describes the basic idea of a novel Digital Rights Management(DRM) method which is composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to... 详细信息
来源: 评论
Fast synchronization recovery for lossy image transmission with a suffix-rich huffman code
Fast synchronization recovery for lossy image transmission w...
收藏 引用
Conference on Applications of Digital Image Processing XXI
作者: Yang, TC Kuo, CCJ Univ So Calif Dept Elect Engn Syst Integrated Media Syst Ctr Los Angeles CA 90089 USA
A new entropy codec, which can recover quickly from the loss of synchronization due to the, occurrence of transmission errors, is proposed and applied to wireless image transmission in this research. This entropy code... 详细信息
来源: 评论
A huffman code Based Image Steganography Technique  1
A Huffman Code Based Image Steganography Technique
收藏 引用
1st International Conference on Applied Algorithms (ICAA)
作者: Nag, Amitava Singh, Jyoti Prakash Biswas, Sushanta Sarkar, Debasree Sarkar, Partha Pratim Acad Technol Hooghly W Bengal India Natl Inst Technol Patna Bihar India Univ Kalyani Kalyani W Bengal India
We present here a novel steganographic method based on huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality to secre... 详细信息
来源: 评论
Nonuniform QAM GFDM RoF system based on probabilistic shaping with huffman code
Nonuniform QAM GFDM RoF system based on probabilistic shapin...
收藏 引用
Asia Communications and Photonics Conference (ACP)
作者: Ren, Jianxin Liu, Bo Zhang, Lijia Zhang, Qi Tian, Qinghua Tian, Feng Xin, Xiangjun Zhao, Lilong Sun, Tingting Beijing Univ Posts & Telecommun Sch Elect Engn Beijing 100876 Peoples R China Nanjing Univ Informat Sci & Technol Inst Opt & Elect Nanjing 210044 Jiangsu Peoples R China Beijing Univ Posts & Telecommun Beijing Key Lab Space Ground Interconnect & Conve Beijing 100876 Peoples R China
A nonuniform QAM GFDM RoF system based on probabilistic shaping with huffman code is proposed. Simulation results show that the proposed system obtains better BER performance than uniform QAM schemes.
来源: 评论