咨询与建议

限定检索结果

文献类型

  • 245 篇 期刊文献
  • 218 篇 会议
  • 15 篇 学位论文
  • 1 篇 资讯

馆藏范围

  • 479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 431 篇 工学
    • 262 篇 电气工程
    • 230 篇 计算机科学与技术...
    • 80 篇 信息与通信工程
    • 51 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 机械工程
    • 12 篇 仪器科学与技术
    • 9 篇 测绘科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 生物医学工程(可授...
    • 6 篇 力学(可授工学、理...
    • 4 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 航空宇航科学与技...
  • 108 篇 理学
    • 53 篇 物理学
    • 45 篇 数学
    • 5 篇 地球物理学
    • 5 篇 生物学
    • 3 篇 化学
    • 3 篇 系统科学
    • 2 篇 地理学
    • 2 篇 统计学(可授理学、...
  • 74 篇 医学
    • 67 篇 临床医学
    • 6 篇 特种医学
    • 4 篇 基础医学(可授医学...
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 4 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学

主题

  • 479 篇 arithmetic codin...
  • 65 篇 data compression
  • 43 篇 compression
  • 34 篇 huffman coding
  • 31 篇 lossless compres...
  • 24 篇 entropy coding
  • 21 篇 image compressio...
  • 20 篇 cabac
  • 19 篇 image coding
  • 16 篇 context modeling
  • 14 篇 source coding
  • 13 篇 video coding
  • 13 篇 jpeg2000
  • 12 篇 wavelet transfor...
  • 12 篇 arithmetic codes
  • 12 篇 entropy
  • 11 篇 redundancy
  • 10 篇 distributed sour...
  • 10 篇 text
  • 10 篇 encryption

机构

  • 12 篇 brno university ...
  • 8 篇 univ waterloo de...
  • 5 篇 univ sci & techn...
  • 4 篇 natl cheng kung ...
  • 3 篇 univ melbourne d...
  • 3 篇 zhejiang univ co...
  • 3 篇 chongqing univ c...
  • 3 篇 tsinghua univ de...
  • 3 篇 microsoft res as...
  • 3 篇 univ minnesota d...
  • 3 篇 wuhan univ techn...
  • 3 篇 hong kong univ s...
  • 3 篇 city univ hong k...
  • 3 篇 purdue univ dept...
  • 2 篇 univ stuttgart i...
  • 2 篇 princeton univ d...
  • 2 篇 chaoyang univ te...
  • 2 篇 cnr iroe nello c...
  • 2 篇 shanghai jiao to...
  • 2 篇 astar inst infoc...

作者

  • 7 篇 yang eh
  • 6 篇 grangetto marco
  • 5 篇 liu dong
  • 5 篇 magli enrico
  • 5 篇 zhou jiantao
  • 5 篇 zhou junwei
  • 5 篇 moffat a
  • 5 篇 shapira dana
  • 5 篇 wong kwok-wo
  • 5 篇 klein shmuel t.
  • 5 篇 wu feng
  • 5 篇 sze vivienne
  • 4 篇 baronti s
  • 4 篇 alparone l
  • 4 篇 olmo gabriella
  • 4 篇 masmoudi atef
  • 4 篇 chen jianyong
  • 4 篇 au oscar c.
  • 4 篇 chandrakasan ana...
  • 4 篇 aiazzi b

语言

  • 448 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"主题词=arithmetic coding"
479 条 记 录,以下是231-240 订阅
排序:
Interval algorithm for random number generation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 1997年 第2期43卷 599-611页
作者: Han, TS Hoshi, M Sch. of Inf. Syst. Univ. of Electro-Commun. Tokyo Japan Graduate School of Information Systems University of Electro-Communications Chofu Tokyo Japan
The problem of generating a random number with an arbitrary probability distribution by using a general biased M-coin is studied, An efficient and very simple algorithm based on the successive refinement of partitions... 详细信息
来源: 评论
Lossless generalized-LSB data embedding
收藏 引用
IEEE TRANSACTIONS ON IMAGE PROCESSING 2005年 第2期14卷 253-266页
作者: Celik, MU Sharma, G Tekalp, AM Saber, E Univ Rochester Dept Elect & Comp Engn Rochester NY 14627 USA Univ Rochester Dept Biostat & Computat Biol Rochester NY 14627 USA Koc Univ Coll Engn Istanbul Turkey Xerox Corp Webster NY 14580 USA
We present a novel lossless (reversible) data-embedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known least sig... 详细信息
来源: 评论
Context-Aware Linguistic Steganography Model Based on Neural Machine Translation
收藏 引用
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING 2024年 32卷 868-878页
作者: Ding, Changhao Fu, Zhangjie Yang, Zhongliang Yu, Qi Li, Daqiu Huang, Yongfeng Nanjing Univ Informat Sci & Technol Engn Res Ctr Digital Forens Minist Educ Nanjing 210000 Peoples R China Xidian Univ Minist Educ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Tsinghua Univ Dept Elect Engn Beijing 100084 Peoples R China
Linguistic steganography based on text generation is a hot topic in the field of text information hiding. Previous studies have managed to improve the syntactic quality of steganography texts using natural language pr... 详细信息
来源: 评论
An algorithm for universal lossless compression with side information
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2006年 第9期52卷 4008-4016页
作者: Cai, Haixiao Kulkarni, Sanjeev R. Verdu, Sergio Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
This paper proposes a new algorithm based on the Context-Tree Weighting (CTW) method for universal compression of a finite-alphabet sequence x(1)(n) with side information y(1)(n) available to both the encoder and deco... 详细信息
来源: 评论
Lossless nibbled data embedding scheme based on difference expansion
收藏 引用
IMAGE AND VISION COMPUTING 2008年 第5期26卷 632-638页
作者: Lu, Tzu-Chuen Chang, Chin-Chen Chaoyang Univ Technol Dept Informat Management Taichung 41349 Taiwan Feng Chia Univ Dept Comp Sci & Informat Engn Taichung 40724 Taiwan
This paper proposes a lossless data embedding scheme of great payload capacity and good image quality, which is based on difference expansion. In this scheme, every pixel in a host image is divided into two nibbles an... 详细信息
来源: 评论
Securing Multimedia Content Using Joint Compression and Encryption
收藏 引用
IEEE MULTIMEDIA 2013年 第4期20卷 50-61页
作者: Pande, Amit Mohapatra, Prasant Zambreno, Joseph Univ Calif Davis Dept Comp Sci Davis CA 95616 USA Iowa State Univ Dept Elect & Comp Engn Ames IA USA
Algorithmic parameterization and hardware architectures can ensure secure transmission of multimedia data in resource-constrained environments such as wireless video surveillance networks, telemedicine frameworks for ... 详细信息
来源: 评论
Lossless Compression on MRI Images Using SWT
收藏 引用
JOURNAL OF DIGITAL IMAGING 2014年 第5期27卷 594-600页
作者: Anusuya, V. Raghavan, V. Srinivasa Kavitha, G. PSR Engn Coll Dept Comp Sci & Engn Sivakasi India Loyola Inst Technol Chennai Tamil Nadu India AAA Coll Engn & Technol Sivakasi Tamil Nadu India
Medical image compression is one of the growing research fields in biomedical applications. Most medical images need to be compressed using lossless compression as each pixel information is valuable. With the wide per... 详细信息
来源: 评论
Two-Symbol FPGA Architecture for Fast arithmetic Encoding in JPEG 2000
收藏 引用
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY 2012年 第2期69卷 213-224页
作者: Kumar, Nandini Ramesh Xiang, Wei Wang, Yafeng Univ So Queensland Fac Engn & Surveying Toowoomba Qld 4350 Australia
JPEG 2000 is one of the most popular image compression standards offering significant performance advantages over previous image standards. High computational complexity of the JPEG 2000 algorithms makes it necessary ... 详细信息
来源: 评论
FIVQ algorithm for interference hyper-spectral image compression
收藏 引用
OPTICS COMMUNICATIONS 2014年 322卷 97-104页
作者: Wen, Jia Ma, Caiwen Zhao, Junsuo Chinese Acad Sci Sci Integrated Informat Syst Lab Inst Software Beijing 100190 Peoples R China Chinese Acad Sci Xian Inst Opt & Precis Mech Xian 710119 Shaanxi Peoples R China
Based on the improved vector quantization (IVQ) algorithm [1] which was proposed in 2012, this paper proposes a further improved vector quantization (FIVQ) algorithm for LASIS (Large Aperture Static Imaging Spectromet... 详细信息
来源: 评论
Cover Reproducible Steganography via Deep Generative Models
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2023年 第5期20卷 3787-3798页
作者: Chen, Kejiang Zhou, Hang Wang, Yaofei Li, Menghan Zhang, Weiming Yu, Nenghai Univ Sci & Technol China CAS Key Lab Electrospace Informat Sch Cyber Sci & Technol Anhui Prov Key Lab Cyberspace Secur Situat Aware Hefei 230026 Anhui Peoples R China Simon Fraser Univ Sch Comp Sci Burnaby BC V5A 1S6 Canada Hefei Univ Technol Sch Comp Sci Hefei 230002 Anhui Peoples R China
Whereas cryptography easily arouses attacks by means of encrypting a secret message into a suspicious form, steganography is advantageous for its resilience to attacks by concealing the message in an innocent-looking ... 详细信息
来源: 评论