咨询与建议

限定检索结果

文献类型

  • 9,249 篇 会议
  • 1,048 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 10,300 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,364 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 575 篇 信息与通信工程
    • 233 篇 软件工程
    • 199 篇 电子科学与技术(可...
    • 187 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 37 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 307 篇 理学
    • 130 篇 系统科学
    • 104 篇 物理学
    • 28 篇 数学
    • 28 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 264 篇 医学
    • 253 篇 临床医学
    • 18 篇 特种医学
    • 10 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,300 篇 transform coding
  • 5,193 篇 image coding
  • 2,138 篇 discrete cosine ...
  • 1,781 篇 video compressio...
  • 1,704 篇 decoding
  • 1,317 篇 streaming media
  • 1,181 篇 bit rate
  • 1,117 篇 encoding
  • 864 篇 quantization
  • 831 篇 video coding
  • 706 篇 watermarking
  • 647 篇 discrete wavelet...
  • 625 篇 robustness
  • 608 篇 image reconstruc...
  • 602 篇 psnr
  • 535 篇 pixel
  • 472 篇 bandwidth
  • 464 篇 feature extracti...
  • 444 篇 image quality
  • 405 篇 motion estimatio...

机构

  • 29 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 18 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 david samoff res...
  • 13 篇 department of el...

作者

  • 35 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 24 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 22 篇 o.c. au
  • 21 篇 feng wu
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 17 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,192 篇 英文
  • 57 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10300 条 记 录,以下是4161-4170 订阅
排序:
JPEG image compression algorithm analysis and local optimization
JPEG image compression algorithm analysis and local optimiza...
收藏 引用
IEEE International Conference on Advanced Management Science (ICAMS)
作者: Xing Wang Xinhuan Feng Nianfeng He Qilong Jia Ying Zou School of Computer Sichuan University Chengdu China School of Computer Chengdu China School of Architecture and Environment Sichuan University Chengdu China School of Architecture and Environment Chengdu China School of Manufacturing Science and Engineering Sichuan University Chengdu China
The purpose of this paper is to analyze and further optimize the JPEG image compression algorithm. First we analysis of JPEG image compression algorithm to achieve the specific methods with the advantages and disadvan... 详细信息
来源: 评论
Image quality assessment-oriented frame capture of video phone over 3G system
Image quality assessment-oriented frame capture of video pho...
收藏 引用
IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID
作者: Chao Feng Lianfen Huang Jianan Lin Jinjin Li School of Information Science and Technology Xiamen University Xiamen China Xiamen University Xiamen Fujian CN
Image quality assessment plays an important role to the 3G network QoE/QoS planners. A great deal of effort has been made in recent years to develop objective image quality metrics that correlate with perceived qualit... 详细信息
来源: 评论
Scalable authentication for various representations of JPEG 2000 images
Scalable authentication for various representations of JPEG ...
收藏 引用
IEEE International Conference on Image Processing
作者: Masafumi Koide Keiichi Iwamura Tokyo University of Science Chiyoda Tokyo Japan
This paper presents an authentication scheme for a JPEG 2000 image codestream, which is obtained by using JPEG 2000 Interactive Protocol (JPIP). JPIP allows a client to request a JPEG 2000 image that has a different r... 详细信息
来源: 评论
The family safety monitoring system based on ethernet and bluetooth
The family safety monitoring system based on ethernet and bl...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Huanbing Gao Liyan Yuan Tao Wang School of Information and Electrical Engineering Shandong Jianzhu University Jinan Shandong China Department of Electronic Engineering Shandong College of Electrical Technology Jinan Shandong China
A family safety monitoring system is designed, which integrated function of telephone alarm, remote control by network, and video linkage. Host alarm system, controlled by MCU, collects data wirelessly from sensors, a... 详细信息
来源: 评论
Parallel multi-regions image restoration system and its implementation
Parallel multi-regions image restoration system and its impl...
收藏 引用
International Conference on Computer Science and Information Technology (CSIT)
作者: Jinliang Wan Long Ye Qin Zhang Information Engineering School Communication University of China Beijing China
Image can be parsed into two main categories of representation: structure shape and region texture. In this paper, the parallel multi-regions image restoration system is proposed in order to ensure the real-time appli... 详细信息
来源: 评论
An efficient prefetching strategy for remote browsing of JPEG 2000 image sequences
An efficient prefetching strategy for remote browsing of JPE...
收藏 引用
International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS
作者: J P García García Ortiz V González González Ruiz I. García D. Müller G. Dimitoglou Comp. Architecture and Electronics Dept. University of Almería Almeríia Spain European Space Agency c/o NASA Goddard Space Flight Center Greenbelt MD USA
This paper proposes an efficient prefetching strategy for interactive remote browsing of sequences of high resolution JPEG 2000 images. As a result of the inherent latency of client-server communication, the experimen... 详细信息
来源: 评论
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
JPEG compression of monochrome 2D-barcode images using DCT c...
收藏 引用
IEEE International Conference on Image Processing
作者: Keng T. Tan Douglas Chai Centre of Holistic Teaching and Learning Hong Kong Baptist University Hong Kong China School of Engineering Faculty of Computing Health and Science Edith Cowan University Joondalup WA Australia
Two dimensional (2D) barcodes are becoming a pervasive interface for mobile devices, such as camera phones. Often, only monochrome 2D-barcodes are used due to their robustness in an uncontrolled operating environment ... 详细信息
来源: 评论
HUBFIRE — A multi-class SVM based JPEG steganalysis using HBCL statistics and Fr Index
HUBFIRE — A multi-class SVM based JPEG steganalysis using H...
收藏 引用
International Conference on Security and Cryptography (SECRYPT)
作者: Veena H. Bhat S. Krishna P. Deepa Shenoy K. R. Venugopal L. M. Patnaik Department of Computer Science and Engineering University of Visvesvaraya College of Engineering Bangalore University Bangalore India Defence Institute of Advanced Technology Pune India
Blind Steganalysis attempts to detect steganographic data without prior knowledge of either the embedding algorithm or the `cover' image. This paper proposes new features for JPEG blind steganalysis using a combin... 详细信息
来源: 评论
DCT-domain watermark detector using a normal inverse Gaussian prior
DCT-domain watermark detector using a normal inverse Gaussia...
收藏 引用
Canadian Conference on Electrical and Computer Engineering (CCECE)
作者: M. I. H. Bhuiyan R. Rahman Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology Dhaka Bangladesh
In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is moti... 详细信息
来源: 评论
High Embedding Reversible Data Hiding Scheme for JPEG
High Embedding Reversible Data Hiding Scheme for JPEG
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Wen-Chung Kuo Shao-Hung Kuo Lih-Chyau Wuu Department of Computer Science and Information Engineering National Formosa University Yunlin Taiwan National YunLin University of Science and Technology Yunlin Taiwan
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding m... 详细信息
来源: 评论