咨询与建议

限定检索结果

文献类型

  • 9,244 篇 会议
  • 1,042 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 10,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,352 篇 工学
    • 1,359 篇 电气工程
    • 921 篇 计算机科学与技术...
    • 573 篇 信息与通信工程
    • 232 篇 软件工程
    • 199 篇 电子科学与技术(可...
    • 187 篇 仪器科学与技术
    • 126 篇 机械工程
    • 101 篇 控制科学与工程
    • 36 篇 测绘科学与技术
    • 27 篇 网络空间安全
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物工程
  • 306 篇 理学
    • 130 篇 系统科学
    • 104 篇 物理学
    • 28 篇 数学
    • 27 篇 地球物理学
    • 16 篇 生物学
    • 5 篇 地理学
  • 263 篇 医学
    • 252 篇 临床医学
    • 18 篇 特种医学
    • 10 篇 基础医学(可授医学...
  • 103 篇 管理学
    • 96 篇 管理科学与工程(可...
  • 40 篇 文学
    • 38 篇 新闻传播学
  • 16 篇 军事学
    • 16 篇 军队指挥学
  • 10 篇 农学
    • 5 篇 作物学
  • 6 篇 法学
  • 5 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10,289 篇 transform coding
  • 5,184 篇 image coding
  • 2,138 篇 discrete cosine ...
  • 1,781 篇 video compressio...
  • 1,703 篇 decoding
  • 1,315 篇 streaming media
  • 1,181 篇 bit rate
  • 1,117 篇 encoding
  • 865 篇 quantization
  • 832 篇 video coding
  • 706 篇 watermarking
  • 647 篇 discrete wavelet...
  • 622 篇 robustness
  • 608 篇 image reconstruc...
  • 602 篇 psnr
  • 535 篇 pixel
  • 472 篇 bandwidth
  • 461 篇 feature extracti...
  • 440 篇 image quality
  • 404 篇 motion estimatio...

机构

  • 29 篇 school of electr...
  • 25 篇 department of el...
  • 24 篇 philips research...
  • 24 篇 hewlett packard ...
  • 23 篇 institute for in...
  • 21 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 microsoft resear...
  • 19 篇 university of ne...
  • 18 篇 department of el...
  • 16 篇 university of sc...
  • 15 篇 department of el...
  • 15 篇 ibm thomas j. wa...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 institute of com...
  • 14 篇 department of el...
  • 14 篇 at and t bell la...
  • 14 篇 david samoff res...
  • 13 篇 department of el...

作者

  • 36 篇 hitoshi kiya
  • 30 篇 andreas uhl
  • 28 篇 thomas richter
  • 26 篇 marek domański
  • 25 篇 fernando pereira
  • 24 篇 liang-gee chen
  • 22 篇 marco mattavelli
  • 22 篇 o.c. au
  • 21 篇 feng wu
  • 20 篇 jiwu huang
  • 18 篇 david taubman
  • 17 篇 xiaolin wu
  • 16 篇 tsung-han tsai
  • 15 篇 wiegand thomas
  • 15 篇 krzysztof wegner
  • 14 篇 jakub stankowski
  • 14 篇 m. vetterli
  • 14 篇 y. nakajima
  • 14 篇 thomas wiegand
  • 14 篇 tomasz grajek

语言

  • 10,181 篇 英文
  • 57 篇 其他
  • 47 篇 中文
  • 2 篇 克罗地亚文
  • 2 篇 土耳其文
检索条件"主题词=transform coding"
10289 条 记 录,以下是4731-4740 订阅
排序:
JPEG decoding via two-dimensional optimal separable filters
JPEG decoding via two-dimensional optimal separable filters
收藏 引用
IEEE International Conference on Image Processing
作者: G. Calvagno G.A. Mian R. Rinaldo Dipartimento di Elettronica e Informatica Università di Padova Padova Italy
In a JPEG decoder, the quantized discrete cosine transform (DCT) coefficient blocks are usually processed using the inverse DCT to reconstruct an approximation of the original image. In the presence of quantization of... 详细信息
来源: 评论
Modelling of visual feature derivation in the VizIR framework
Modelling of visual feature derivation in the VizIR framewor...
收藏 引用
European Signal Processing Conference (EUSIPCO)
作者: Horst Eidenberger Institute of Software Technology and Interactive Systems Vienna University of Technology Wien Austria (Europe)
If visual information retrieval should make further progress, it will be necessary to identify new ways to derive visual properties from higher levels of understanding than the pixel level (e.g. from low-level feature... 详细信息
来源: 评论
Analysis of Facebook steganographic capabilities
Analysis of Facebook steganographic capabilities
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Nathaniel D. Amsden Lei Chen Department of Computer Science Sam Houston State University Huntsville TX
The massive information-sharing capabilities and global reach of Facebook are of great interest to organizations of all types, including those with malicious and/or illegal intents. Our main findings in this research ... 详细信息
来源: 评论
Fixed-point DSP implementation of wavelet decomposition for image processing
Fixed-point DSP implementation of wavelet decomposition for ...
收藏 引用
IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
作者: G. Frassi A. Bellini Dipartimento di Ingegneria dellhformazione AIDA Universitá degli Studi di Parma Parma Italy
Real time implementation of wavelet transformations is becoming of great importance, since it is one of the key elements of JPEG2000 and MPEG4 encoding operations. This paper details a dedicated wavelet decomposition ... 详细信息
来源: 评论
An empirical study of secure MPEG video transmissions
An empirical study of secure MPEG video transmissions
收藏 引用
Network and Distributed System Security
作者: I. Agi L. Gong Computer Science Laboratory SRI International Inc. Menlo Park CA USA
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision is specified in the standard. We conduct... 详细信息
来源: 评论
Fractal Based Digital Image Watermarking Using Fuzzy C-Mean Clustering
Fractal Based Digital Image Watermarking Using Fuzzy C-Mean ...
收藏 引用
International Conference on Information Management and Engineering, ICIME
作者: Soheila Kiani Mohsen Ebrahimi Moghaddam Electrical and Computer Engineering Department Shahid Beheshti University Tehran Iran
In this paper, a new watermarking method is presented to embed a binary watermark into an image. The proposed method uses a special type of fractal coding that its parameters are contrast scaling and the mean of range... 详细信息
来源: 评论
An SVD-based watermarking method for image content authentication with improved security
An SVD-based watermarking method for image content authentic...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Seungiae Lee Dalwon Jang C.D. Yoo Digital Contents Research Division Electronics and Telecommunications Research Institute Daejeon South Korea Department of EECS Division of EE KAIST Daejeon South Korea
For image content authentication, a secure watermarking method using quantization-based embedding on the largest singular value (SV) is proposed. The block-wise quantization-based embedding can be vulnerable to vector... 详细信息
来源: 评论
Detecting Forged Images a Robust Java Implementation Algorithm
Detecting Forged Images a Robust Java Implementation Algorit...
收藏 引用
International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
作者: Gabriel Rădulescu Ileana Dumitru Automatic Control Computers and Electronics Department Petroleum-Gas University Ploiesti ROMANIA Cybernetics Economic Informatics Finance and Accountancy Department Petroleum-Gas University Ploiesti ROMANIA
Image manipulation represents a true “art”, which takes into account the images with a lot of their properties. There are many ways a digital photo can be manipulated, so the forger can use one or more combinations ... 详细信息
来源: 评论
Key-Based Input transformation Defense Against Adversarial Examples
Key-Based Input Transformation Defense Against Adversarial E...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Yi Qin Chuan Yue Colorado School of Mines Golden CO USA
Machine learning models are vulnerable to adversarial examples which are generated by adding perturbations to clean images. Input transformation defenses were proposed to defend against adversarial examples at test ti... 详细信息
来源: 评论
An embedded sinusoidal transform codec with measured phases and sampling rate scalability
An embedded sinusoidal transform codec with measured phases ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: G. Aguilar Juin-Hwey Chen R.B. Dunn R.J. McAulay Xiaoqin Sun Wei Wang R. Zopf Speech Technology Group VoIP Access Networks Lucent InterNetworking Systems Red Bank NJ USA Massachusetts Institute of Technology Cambridge MA USA
This paper describes an embedded sinusoidal transform codec that is scalable not only in bit-rate, but also in sampling rate. In a representative implementation, the system produces an embedded bit-stream at 3.2 and 6... 详细信息
来源: 评论