咨询与建议

限定检索结果

文献类型

  • 9,246 篇 会议
  • 1,049 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 10,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,358 篇 工学
    • 1,365 篇 电气工程
    • 923 篇 计算机科学与技术...
    • 575 篇 信息与通信工程
    • 233 篇 软件工程
    • 199 篇 电子科学与技术(可...
    • 187 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 37 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 307 篇 理学
    • 130 篇 系统科学
    • 104 篇 物理学
    • 28 篇 数学
    • 28 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 264 篇 医学
    • 253 篇 临床医学
    • 18 篇 特种医学
    • 10 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,298 篇 transform coding
  • 5,193 篇 image coding
  • 2,139 篇 discrete cosine ...
  • 1,782 篇 video compressio...
  • 1,704 篇 decoding
  • 1,316 篇 streaming media
  • 1,181 篇 bit rate
  • 1,118 篇 encoding
  • 865 篇 quantization
  • 832 篇 video coding
  • 706 篇 watermarking
  • 647 篇 discrete wavelet...
  • 624 篇 robustness
  • 608 篇 image reconstruc...
  • 602 篇 psnr
  • 535 篇 pixel
  • 472 篇 bandwidth
  • 462 篇 feature extracti...
  • 444 篇 image quality
  • 405 篇 motion estimatio...

机构

  • 29 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 18 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 david samoff res...
  • 13 篇 department of el...

作者

  • 35 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 24 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 22 篇 o.c. au
  • 21 篇 feng wu
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 17 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,190 篇 英文
  • 57 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10298 条 记 录,以下是4471-4480 订阅
排序:
Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology
Medical Image Archiving, Processing, Analysis and Communicat...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Piyamas Suapang Kobchai Dejhan Surapun Yimmun Department of Telecommunications Engineering Faculty of Engineering King Mongkut''s Institute of Technology Ladkrabang Bangkok Thailand Department of Industrial Physics and Medical Instrumentation Faculty of Applied Science King Mongkut's University of Technology North Bangkok Bangkok Thailand
The design and implementation of Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology which DICOM server was developed using software such as Borland Delphi 6.0, PHP and MySQL for i... 详细信息
来源: 评论
Image Steganography and Chrominance Components
Image Steganography and Chrominance Components
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Adel Almohammad Gheorghita Ghinea Brunei University Uxbridge UK
Digital images are the most common cover files used for steganography. This paper investigates the pros and cons of colour and grayscale versions of images when used as steganography covers. Therefore, it comparativel... 详细信息
来源: 评论
Bhattacharyya Distance for Blind Image Steganalysis
Bhattacharyya Distance for Blind Image Steganalysis
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Ke Ke Tao Zhao Ou Li Information Science and Technology Institute Zhengzhou China
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, B... 详细信息
来源: 评论
Mutimedia learner corpus of foreigner's basic presentation in English with evaluations
Mutimedia learner corpus of foreigner's basic presentation i...
收藏 引用
International Conference on Educational and Information Technology (ICEIT)
作者: Kiyota Hashimoto Kazuhiro Takeuchi School of Humanities and Social Sciences Osaka Prefecture University Sakai Japan Department of Engineering Informatics Osaka Electro Communication University Osaka Japan
Presentation skill is essential both for academic and business purposes, but its training, particularly in Asian countries, still heavily depends on experiences. This paper reconsiders presentation skill and reports o... 详细信息
来源: 评论
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code
A New method to reduce the probability of detection errors f...
收藏 引用
International Symposium on Information Theory and Its Applications, ISITA
作者: Tetsushi Masuno Toru Fujiwara Takuya Kusaka Graduate School of Natural Science and Technology Okayama University Okayama Japan Graduate School of Information Science and Technology Osaka University Suita Osaka Japan
A new method using an error correcting code to reduce the probability of detection error for a digital watermark is proposed. The performance of the method is evaluated with a digital watermark for a 2D image as an ex... 详细信息
来源: 评论
Depth image based rendering with advanced texture synthesis
Depth image based rendering with advanced texture synthesis
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: P. Ndjiki-Nya M. Köppel D. Doshkov H. Lakshman P. Merkle K. Müller T. Wiegand Fraunhofer Institut for Telecommunications Heinrich-Hertz-Institut Einsteinufer 37 Berlin Germany
In free viewpoint television or 3D video, depth image based rendering (DIBR) is used to generate virtual views based on a textured image and its associated depth information. In doing so, image regions which are occlu... 详细信息
来源: 评论
Robust lossless data hiding: Analysis and evaluation
Robust lossless data hiding: Analysis and evaluation
收藏 引用
International Conference on High Performance Computing & Simulation (HPCS)
作者: Lingling An Xinbo Gao Cheng Deng Feng Ji School of Electronic Engineering Xidian University Xi'an China
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of the robust LDH methods is the reversi... 详细信息
来源: 评论
Super-resolution decoding of JPEG-compressed image data with the shrinkage in the redundant DCT domain
Super-resolution decoding of JPEG-compressed image data with...
收藏 引用
Picture coding Symposium, PCS
作者: Takashi Komatsu Yasutaka Ueda Takahiro Saito Kanagawa University Japan
Alter, Durand and Froment introduced the total-variation (TV) minimization approach to the artifact-free JPEG decoding, which is referred to as the ADF decoding method [1]. They formulated the decoding problem as the ... 详细信息
来源: 评论
Implementation of MPEG-4 audio player on embedded devices
Implementation of MPEG-4 audio player on embedded devices
收藏 引用
International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Jail Jung Kyung-Ae Cha D. T. S Interactive Company Daegu South Korea Division of Computer & Communication Engineering Daegu University Gyeongsan South Korea
Because small mobile devices do not include a floating-point processing unit due to their circuit complexity and power consumption, there exist some disconnections or noises caused by lengthening the decoding time of ... 详细信息
来源: 评论
Undetectable image tampering through JPEG compression anti-forensics
Undetectable image tampering through JPEG compression anti-f...
收藏 引用
IEEE International Conference on Image Processing
作者: Matthew C. Stamm Steven K. Tjoa W. Sabrina Lin K.J. Ray Liu Department of Electrical and Computer Engineering University of Maryland College Park USA
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries. Though these technique... 详细信息
来源: 评论