咨询与建议

限定检索结果

文献类型

  • 9,252 篇 会议
  • 1,244 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 10,497 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,552 篇 工学
    • 1,560 篇 电气工程
    • 964 篇 计算机科学与技术...
    • 654 篇 信息与通信工程
    • 240 篇 软件工程
    • 213 篇 电子科学与技术(可...
    • 188 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 37 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 8 篇 航空宇航科学与技...
    • 7 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 309 篇 理学
    • 130 篇 系统科学
    • 107 篇 物理学
    • 28 篇 数学
    • 28 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 269 篇 医学
    • 259 篇 临床医学
    • 20 篇 特种医学
    • 9 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,497 篇 transform coding
  • 5,315 篇 image coding
  • 2,189 篇 discrete cosine ...
  • 1,846 篇 video compressio...
  • 1,748 篇 decoding
  • 1,343 篇 streaming media
  • 1,218 篇 bit rate
  • 1,135 篇 encoding
  • 893 篇 quantization
  • 867 篇 video coding
  • 713 篇 watermarking
  • 653 篇 discrete wavelet...
  • 637 篇 robustness
  • 635 篇 image reconstruc...
  • 614 篇 psnr
  • 544 篇 pixel
  • 477 篇 bandwidth
  • 461 篇 feature extracti...
  • 453 篇 image quality
  • 419 篇 motion estimatio...

机构

  • 30 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 19 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 david samoff res...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 department of el...

作者

  • 35 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 23 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 21 篇 feng wu
  • 21 篇 o.c. au
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 16 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,365 篇 英文
  • 81 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10497 条 记 录,以下是3921-3930 订阅
排序:
Image segmentation in the JPEG2000 domain
Image segmentation in the JPEG2000 domain
收藏 引用
International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)
作者: Hsi-Chin Hsin Tze-Yun Sung Department of Computer Science and Information Engineering National United University Miaoli Taiwan Department of Microelectronics Engineering Chung Hua University Hsinchu Taiwan
This paper presents a simple method to segment JPEG2000 images based on the features extracted from the MQ table such that the burden of decompressing computations can be avoided. The feature vectors are segmented by ... 详细信息
来源: 评论
A digital watermarking algorithm based on wavelet transform and singular value segmentation of the watermark image
A digital watermarking algorithm based on wavelet transform ...
收藏 引用
Chinese Control Conference (CCC)
作者: Xianzhen Jin Zhilin Feng Zhijiang college of zhejiang university of technology Hangzhou 310024 China
Digital watermarking is a topic that has recently gained increasing attention all over the world, we divide singular values of watermark image into two parts, then embed them into the LL and HH subband of DWT domain o... 详细信息
来源: 评论
THE COST OF JPEG COMPRESSION ANTI-FORENSICS
THE COST OF JPEG COMPRESSION ANTI-FORENSICS
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: G. Valenzise M. Tagliasacchi S. Tubaro Politecnico di Milano Italy
The statistical footprint left by JPEG compression can be a valuable source of information for the forensic analyst. Recently, it has been shown that a suitable anti-forensic method can be used to destroy these traces... 详细信息
来源: 评论
A low complexity JPEG domain face recognition approach using low frequency coefficients
A low complexity JPEG domain face recognition approach using...
收藏 引用
International Conference on Information, Communications and Signal Processing
作者: M. Shahram Moin Alireza Sepasmoghaddam Hamidreza Rashidy Kanan Electrical Computer and IT Engineering Department Islamic Azad University Qazvin Iran Electrical Engineering Department Bu-Ali Sina University Hamedan Iran
Face recognition in JPEG compressed domain is one of the recent challenges in biometric systems, leading to a considerable reduction in computational overhead caused by decompression process, without any notable degra... 详细信息
来源: 评论
Effective encoding of TV-Anytime metadata using EXI
Effective encoding of TV-Anytime metadata using EXI
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Young-Guk Ha Beom-Seok Jang Bong-Jin Oh Yu-Seok Bae Eui-Hyun Paik Konkuk University Seoul South Korea Electronics and Telecommunications Research Institute Daejeon South Korea
The TVA metadata allows consumers to find, navigate, and manage contents through a variety of terminal devices including PDR, DTV, and IPTV. In general, a TVA metadata description is delivered from a content provider ... 详细信息
来源: 评论
Efficient custom instruction enumeration for extensible processors
Efficient custom instruction enumeration for extensible proc...
收藏 引用
International Conference on Application Specific Systems (ASAP), Architectures and Processors
作者: Chenglong Xiao Emmanuel Casseau Irisa Inria University of Rennes I France
In recent years, the use of extensible processors has been increased. Extensible processors extend the base instruction set of a general-purpose processor with a set of custom instructions. Custom instructions that ca... 详细信息
来源: 评论
Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
Detecting Copy-Move Forgery Using Non-negative Matrix Factor...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Heng Yao Tong Qiao Zhenjun Tang Yan Zhao Hualing Mao School of Communication and Information Engineering Shanghai University Shanghai China Department of Computer Science Guangxi Normal University Guilin China
Copy-move is a common manipulation of digital image tampering. Block matching after feature extraction is mostly applied method to detect this kind of forgery. In this paper, we propose an efficient copy-move detectin... 详细信息
来源: 评论
An encryption scheme for JPEG 2000 using a chaotic pseudorandom bit generator
An encryption scheme for JPEG 2000 using a chaotic pseudoran...
收藏 引用
International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)
作者: Shun-Cheng Hong Chun-Te Li Hsi-Kuan Chen Chin-Hsing Chen Institute of Computer and Communication National Cheng Kung University Tainan Taiwan Department of Electrical Engineering Nan Jeon Institute of Technology Tainan Taiwan
In this paper, we propose a format compliant feedback encryption scheme for JPEG2000 by using a chaotic pseudo-random bit generator. This chaotic pseudo-random bit generator is purturbed to enhance cryptographic prope... 详细信息
来源: 评论
Relevance feedback for semantic classification: A comparative study
Relevance feedback for semantic classification: A comparativ...
收藏 引用
IEEE Signal Processing and Communications Applications (SIU)
作者: Tuğrul K. Ateş Savaş Özkan Medeni Soysal A. Aydın Alatan Elektrik-Elektronik Mühendisliği Bölümü Orta Doğu Teknik Üniversitesi Turkey Elektrik-Elektronik Mühendisliği Bölümü Osmangazi Üniversitesi Turkey
Immense increase in the number of multimedia content accessible from television and internet with the help developing technologies reveals efficient supervision and classification of such content as a problem. Relevan... 详细信息
来源: 评论
Countering JPEG anti-forensics
Countering JPEG anti-forensics
收藏 引用
IEEE International Conference on Image Processing
作者: G. Valenzise V. Nobile M. Tagliasacchi S. Tubaro Dipartimento di Elettronica e Informazione Politecnico di Milano Italy
JPEG coding leaves characteristic footprints that can be leveraged to reveal doctored images, e.g. providing the evidence for local tampering, copy-move forgery, etc. Recently, it has been shown that a knowledgeable a... 详细信息
来源: 评论