咨询与建议

限定检索结果

文献类型

  • 9,244 篇 会议
  • 1,042 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 10,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,352 篇 工学
    • 1,359 篇 电气工程
    • 921 篇 计算机科学与技术...
    • 573 篇 信息与通信工程
    • 232 篇 软件工程
    • 199 篇 电子科学与技术(可...
    • 187 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 36 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 306 篇 理学
    • 130 篇 系统科学
    • 104 篇 物理学
    • 28 篇 数学
    • 27 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 263 篇 医学
    • 252 篇 临床医学
    • 18 篇 特种医学
    • 10 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,289 篇 transform coding
  • 5,184 篇 image coding
  • 2,138 篇 discrete cosine ...
  • 1,781 篇 video compressio...
  • 1,703 篇 decoding
  • 1,315 篇 streaming media
  • 1,181 篇 bit rate
  • 1,117 篇 encoding
  • 865 篇 quantization
  • 832 篇 video coding
  • 706 篇 watermarking
  • 647 篇 discrete wavelet...
  • 622 篇 robustness
  • 608 篇 image reconstruc...
  • 602 篇 psnr
  • 535 篇 pixel
  • 472 篇 bandwidth
  • 461 篇 feature extracti...
  • 440 篇 image quality
  • 404 篇 motion estimatio...

机构

  • 29 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 18 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 david samoff res...
  • 13 篇 department of el...

作者

  • 36 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 24 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 22 篇 o.c. au
  • 21 篇 feng wu
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 17 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,181 篇 英文
  • 57 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10289 条 记 录,以下是4701-4710 订阅
排序:
DCT-domain watermark detector using a normal inverse Gaussian prior
DCT-domain watermark detector using a normal inverse Gaussia...
收藏 引用
Canadian Conference on Electrical and Computer Engineering (CCECE)
作者: M. I. H. Bhuiyan R. Rahman Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology Dhaka Bangladesh
In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is moti... 详细信息
来源: 评论
A Novel Reversible Semi-Fragile Watermarking Algorithm of MPEG-4 Video for Content Authentication
A Novel Reversible Semi-Fragile Watermarking Algorithm of MP...
收藏 引用
International Symposium on Intelligent Information Technology Application, IITA
作者: Hui Chen Zhenyong Chen Xiao Zeng Wei Fan Zhang Xiong School of Computer Science and Engineering Beihang University Beijing China
This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV... 详细信息
来源: 评论
Digital image forgery detection on artificially blurred images
Digital image forgery detection on artificially blurred imag...
收藏 引用
International Conference on Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA)
作者: Hrudya P Lekha S. Nair Adithya S.M Reshma Unni Vishnu Priya H Prabaharan Poornachandran Amrita Center for Cyber Security Amrita Vishwa Vidyapeetham Kollam Kerala India
In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture... 详细信息
来源: 评论
Parallelization and characterization of SIFT on multi-core systems
Parallelization and characterization of SIFT on multi-core s...
收藏 引用
IEEE International Workshop/Symposium on Workload Characterization
作者: Hao Feng Eric Li Yurong Chen Yimin Zhang Application Research Laboratory Intel China Research Center Limited China
This paper parallelizes and characterizes an important computer vision application -Scale Invariant Feature transform (SIFT) both on a Symmetric Multiprocessor (SMP) platform and a large scale Chip Multiprocessor (CMP... 详细信息
来源: 评论
A New Method of Subway Tunnel Crack Image Compression Based on ROI and Motion Estimation
A New Method of Subway Tunnel Crack Image Compression Based ...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Xiaoyang Wu Yun Liu Dapeng Qi Zhenjiang Zhang Department of Electronic and Information Engineering Beijing Jiaotong University Beijing China
Aiming at the characteristics of the subway tunnel crack images, this paper presents a new method of subway tunnel crack image compression based on region of interest and motion estimation. It contains three key parts... 详细信息
来源: 评论
Protection of privacy in JPEG files using reversible information hiding
Protection of privacy in JPEG files using reversible informa...
收藏 引用
IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)
作者: Michiharu Niimi Fuyuki Masutani Hideki Noda Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka Japan
The privacy of unknown person may be included in the digital images unintentionally. The action of the file upload of it would constitute an invasion of his/her privacy. The JPEG files may include an exif information ... 详细信息
来源: 评论
Smart video packet trimming technique over congested networks
Smart video packet trimming technique over congested network...
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Amer Zaheer Tariq Saraj Asim Rasheed Touseef Javed Amir Qayyunr Center of Research in Networks and Telecom (CoReNeT) Muhammad Ali Jinnah University Islamabad Pakistan
In past few years, multimedia traffic is growing and Internet have maximum portion of multimedia traffic. This traffic trend is expected to increase due to multimedia applications. Best effort Internet architecture po... 详细信息
来源: 评论
Finding a suitable wavelet for image compression applications
Finding a suitable wavelet for image compression application...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: S. Masud J.V. McCanny DSiP Laboratories School of Electrical Engineering and Computer Science Queen''s University Belfast Ireland Queen's University Belfast Belfast Belfast GB
In this paper we assess the relative merits of various types of wavelet functions for use in a wide range of image compression scenarios. We have delineated different algorithmic criteria that can be used for wavelet ... 详细信息
来源: 评论
Design of high-performance transform and quantization circuit for unified video CODEC
Design of high-performance transform and quantization circui...
收藏 引用
IEEE Asia-Pacific Conference on Circuits and Systems
作者: Seonyoung Lee Kyeongsoon Cho Department of Electronics and Information Engineering Hankuk University of Foreign Studies Yongin si South Korea
This paper presents the new high-performance circuit architecture of the transform and quantization for unified video CODEC. The proposed architecture can be applied to all kinds of transforms for the video compressio... 详细信息
来源: 评论
Study of Copy-Move Forgery Detection Techniques in Images
Study of Copy-Move Forgery Detection Techniques in Images
收藏 引用
International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Ankita Bansal Aditya Atri Division of Information Technology Netaji Subhas University of Technology Delhi India
With the evolution of tools used for image editing in today's world, the images can be manipulated with ease. Resizing, cloning, cropping, etc., becomes easy and fast while on the other end, a great challenge in f... 详细信息
来源: 评论