咨询与建议

限定检索结果

文献类型

  • 9,244 篇 会议
  • 1,048 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 10,295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,358 篇 工学
    • 1,365 篇 电气工程
    • 923 篇 计算机科学与技术...
    • 575 篇 信息与通信工程
    • 233 篇 软件工程
    • 199 篇 电子科学与技术(可...
    • 187 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 37 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 307 篇 理学
    • 130 篇 系统科学
    • 104 篇 物理学
    • 28 篇 数学
    • 28 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 264 篇 医学
    • 253 篇 临床医学
    • 18 篇 特种医学
    • 10 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,295 篇 transform coding
  • 5,190 篇 image coding
  • 2,139 篇 discrete cosine ...
  • 1,781 篇 video compressio...
  • 1,704 篇 decoding
  • 1,315 篇 streaming media
  • 1,181 篇 bit rate
  • 1,117 篇 encoding
  • 865 篇 quantization
  • 832 篇 video coding
  • 706 篇 watermarking
  • 647 篇 discrete wavelet...
  • 624 篇 robustness
  • 608 篇 image reconstruc...
  • 602 篇 psnr
  • 535 篇 pixel
  • 472 篇 bandwidth
  • 462 篇 feature extracti...
  • 444 篇 image quality
  • 404 篇 motion estimatio...

机构

  • 29 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 18 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 david samoff res...
  • 13 篇 department of el...

作者

  • 36 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 24 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 22 篇 o.c. au
  • 21 篇 feng wu
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 17 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,187 篇 英文
  • 57 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10295 条 记 录,以下是4571-4580 订阅
排序:
JPEG AI Compressed Domain Face Detection
JPEG AI Compressed Domain Face Detection
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Ayman Alkhateeb Alessandro Gnutti Fabrizio Guerrini Riccardo Leonardi João Ascenso Fernando Pereira Dep. of Information Engineering CNIT - University of Brescia Italy Dep. of Electronics Engineering University of Rome Tor Vergata Italy Instituto Superior Técnico Universidade de Lisboa - Instituto de Telecomunicações Lisbon Portugal
Learning-based image coding has achieved competitive performance in terms of compression efficiency, while also gaining a key advantage in the ability to carry out computer vision tasks directly in the compressed doma... 详细信息
来源: 评论
An area-efficient IDCT architecture for multiple video standards
An area-efficient IDCT architecture for multiple video stand...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Guiying Liu School of Information Science and Technology Zhanjiang Normal University Zhanjiang China
In this paper, we introduce a unified 1-D IDCT architecture for a video decoder supporting multiple standards including AVS, VC-1, MPEG-4 and H.264. The low-cost architecture is implemented by the method of matrix dec... 详细信息
来源: 评论
A fast degradation-free algorithm for DCT block extraction in the compressed domain
A fast degradation-free algorithm for DCT block extraction i...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Y. Shibata Zhigang Chen R.H. Campbell Platform Software Development Center Sony Corporation Tokyo Japan Department of Computer Science University of Illinois Urbana-Champaign Urbana IL USA
A fast, degradation-free solution for the DCT block extraction problem is proposed. The problem is defined as extracting a DCT block from a DCT compressed frame composed of DCT blocks. This problem is encountered in b... 详细信息
来源: 评论
Security for Video Surveillance with Privacy
Security for Video Surveillance with Privacy
收藏 引用
International Conference on Internet Technology and Applications (iTAP)
作者: Jie Shen XiaoYu Zheng Sch. of Comput. Sci. & Eng. Univ. of Electron. Sci. & Technol. of China Chengdu China Hydro-China Chengdu Eng. Corp. Chengdu China
In this paper, a video surveillance system is designed to provide means for ensuring privacy information security and offer the capability of proving authenticity. First, a real-time scrambling approach to conceal vid... 详细信息
来源: 评论
Copy move forgery detection based on LBP
Copy move forgery detection based on LBP
收藏 引用
IEEE Signal Processing and Communications Applications (SIU)
作者: Güzin Ulutaş Mustafa Ulutaş Vasif V. Nabiyev Bilgisayar Mühendisliği Bölümü Karadeniz Teknik Üniversitesi Trabzon Turkey
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another loca... 详细信息
来源: 评论
Scalable authentication for various representations of JPEG 2000 images
Scalable authentication for various representations of JPEG ...
收藏 引用
IEEE International Conference on Image Processing
作者: Masafumi Koide Keiichi Iwamura Tokyo University of Science Chiyoda Tokyo Japan
This paper presents an authentication scheme for a JPEG 2000 image codestream, which is obtained by using JPEG 2000 Interactive Protocol (JPIP). JPIP allows a client to request a JPEG 2000 image that has a different r... 详细信息
来源: 评论
A Detection Method Research for Data Hiding Based on Markov Chain
A Detection Method Research for Data Hiding Based on Markov ...
收藏 引用
International Conference on Computational and Information Sciences (ICCIS)
作者: Zhu Li Zhao Huimin Industrial Training Center Guangdong Polytechnic Normal University Guangzhou China College of Electronics and Information Guangdong Polytechnic Normal University Guangzhou China
For theoretical disadvantages of detecting images signal based on independent and identically distributed (i.i.d.) models used for hiding data, a novel detection method is provided based on Markov chain in the paper. ... 详细信息
来源: 评论
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible transformations
PhotoProof: Cryptographic Image Authentication for Any Set o...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Assa Naveh Eran Tromer Blavatnik School of Computer Science Tel Aviv University Tel Aviv Israel
Since the invention of the camera, photos have been used to document reality and to supply proof of events. Yet today it is easy to fabricate realistic images depicting events that never happened. Thus, dozens of pape... 详细信息
来源: 评论
Efficient and reliable dynamic quality control for compression of compound document images
Efficient and reliable dynamic quality control for compressi...
收藏 引用
IEEE International Conference on Image Processing
作者: A. Said Hewlett-Packard Laboratories Palo Alto CA USA
Compound images contain a mixture of natural images, text, and graphics. They need special care in the use of compression because text and graphics cannot withstand the significant distortion that is acceptable for na... 详细信息
来源: 评论
Is MPEG encryption by using random list instead of zigzag order secure?
Is MPEG encryption by using random list instead of zigzag or...
收藏 引用
IEEE International Symposium on Consumer Electronics (ISCE)
作者: Lintian Qiao K. Nahrstedt Ming-Chit Tam Department of Computer Science University of Illinois Urbana-Champaign Urbana IL USA Institute of System Science NUS Singapore
This paper discusses the problems of the MPEG video encryption algorithm by using a random permutation list instead of a zigzag order within the MPEG compression process. We show that (1) the encryption method causes ... 详细信息
来源: 评论