X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (268) 268
Conference Proceeding (43) 43
Patent (41) 41
Newsletter (10) 10
Publication (9) 9
Book Chapter (8) 8
Magazine Article (8) 8
Dissertation (7) 7
Book / eBook (3) 3
Book Review (1) 1
Government Document (1) 1
Newspaper Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
encryption (176) 176
algorithms (136) 136
image compression (125) 125
images (101) 101
engineering, electrical & electronic (90) 90
computer science, information systems (72) 72
image encryption (72) 72
computer science (64) 64
cryptography (64) 64
computer science, theory & methods (63) 63
computer science, software engineering (57) 57
physics (49) 49
chaos theory (47) 47
image coding (47) 47
security (47) 47
algorithm (45) 45
verschlüsselung (44) 44
data compression (42) 42
analysis (41) 41
calculating (41) 41
computing (41) 41
counting (41) 41
image data processing or generation, in general (41) 41
multimedia information systems (41) 41
computer communication networks (40) 40
compression (39) 39
data encryption (38) 38
engineering (37) 37
image processing (36) 36
special purpose and application-based systems (36) 36
computer simulation (35) 35
compressive sensing (33) 33
pixels (30) 30
watermarking (30) 30
image transmission (28) 28
multimedia (27) 27
scheme (27) 27
wavelet transforms (27) 27
permutation (24) 24
data structures, cryptology and information theory (23) 23
bildkompression (22) 22
chaos (22) 22
image quality (22) 22
system (21) 21
computer information security (20) 20
optics (20) 20
permutations (20) 20
coding (19) 19
jpeg encoders-decoders (19) 19
detection (18) 18
diffusion (18) 18
image reconstruction (18) 18
signal processing (18) 18
signal, image and speech processing (18) 18
verschlüsselungsalgorithmus (18) 18
data structures and information theory (17) 17
digital imaging (17) 17
map (17) 17
compressing (16) 16
methods (16) 16
chaotic system (15) 15
cryptanalysis (15) 15
electric communication technique (15) 15
electricity (15) 15
investment analysis (14) 14
simuliertes ergebnis (14) 14
telecommunications (14) 14
画像 (14) 14
chaotic map (13) 13
chaotisches system (13) 13
compressed sensing (13) 13
computer programs (13) 13
computer security (13) 13
暗号化 (13) 13
compression ratio (12) 12
discrete cosine transform (12) 12
imaging science & photographic technology (12) 12
mechanical engineering (12) 12
steganography (12) 12
computer science, artificial intelligence (11) 11
data security (11) 11
engineering, mechanical (11) 11
equipment and supplies (11) 11
mechanics (11) 11
medical imaging (11) 11
transmission of digital information, e.g. telegraphiccommunication (11) 11
discrete wavelet transform (10) 10
electrical engineering (10) 10
entropy (10) 10
maps (10) 10
standards (10) 10
暗号 (10) 10
arithmetic coding (9) 9
automotive engineering (9) 9
color (9) 9
communications engineering, networks (9) 9
deoxyribonucleic acid--dna (9) 9
digital (9) 9
entschlüsselung (9) 9
fourier transforms (9) 9
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Security and Communication Networks, ISSN 1939-0114, 11/2019, Volume 2019, pp. 1 - 12
This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework. In block compressed sensing, the plain image... 
STEGANOGRAPHY | CHAOTIC SYSTEM | MEDICAL IMAGES | WATERMARKING | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | TELECOMMUNICATIONS | Security management | Algorithms | Medical imaging equipment
Journal Article
03/2018
The invention discloses a Facebook-compression-resistance image encryption method. The method sequentially includes the following steps: carrying out 8x8 block... 
IMAGE DATA PROCESSING OR GENERATION, IN GENERAL | ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | COMPUTING | COUNTING | PHYSICS | CALCULATING | ELECTRICITY
Patent
MULTIMEDIA TOOLS AND APPLICATIONS, ISSN 1380-7501, 03/2020, Volume 79, Issue 9-10, pp. 6045 - 6059
Journal Article
Optics and Lasers in Engineering, ISSN 0143-8166, 11/2017, Volume 98, pp. 123 - 133
•A novel image compression-encryption scheme using compressive sensing (CS) and double random phase encoding technique is proposed.•The scheme provides a... 
Compressive sensing | Double random phase encoding | Optical image encryption | Gyrator transform | Reality-preserving fractional cosine transform | ENCRYPTION | RANDOM PROJECTIONS | OPTICS | PLAINTEXT ATTACK | Computer science | Analysis
Journal Article
Wuli Xuebao/Acta Physica Sinica, ISSN 1000-3290, 06/2013, Volume 62, Issue 11
A novel joint compression-encryption algorithm based on embedded zerotree wavelet (EZW) coding is proposed. Encryption process is performed before entropy... 
Image encryption | Logistic map | Image compression | Embedded zerotree wavelet (EZW) | embedded zerotree wavelet (EZW) | PHYSICS, MULTIDISCIPLINARY | image encryption | image compression | logistic map
Journal Article
Proceedings of SPIE - The International Society for Optical Engineering, ISSN 0277-786X, 2008, Volume 6819
Conference Proceeding
Advances in Engineering Software, ISSN 0965-9978, 07/2012, Volume 49, Issue 1, pp. 29 - 42
► Image is encrypted by using 3D cat and 3D standard maps. ► Elliptic Curve Cryptography is used for secure transfer of session key. ► A compression technique... 
Cat map | ECDLP | Standard map | Elliptic Curve Cryptography | Chaotic map | Curvelet transform | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | SELECTIVE ENCRYPTION | ENGINEERING, MULTIDISCIPLINARY | CIPHERS | BAKER | Computer science | Cryptography | Compressing | Images | Entropy | Image transmission | Diffusion | Coefficients | Standards | Three dimensional
Journal Article
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), ISSN 0302-9743, 2015, Volume 9119, pp. 696 - 705
Conference Proceeding
03/2013, Volume 37, Issue 5
On the basis of the study of simultaneous image compression and encryption using number theory, combined with image multiplexing technique, an improved... 
Multiplexing | Algorithms | Computer simulation | Images | Image compression | Encryption | Compressed | Number theory
Magazine Article
03/2013, Volume 37, Issue 5
On the basis of the study of simultaneous image compression and encryption using number theory, combined with image multiplexing technique, an improved... 
Multiplexing | Algorithms | Computer simulation | Images | Image compression | Encryption | Compressed | Number theory
Magazine Article
PLoS ONE, ISSN 1932-6203, 01/2014, Volume 9, Issue 1, p. e84655
Journal Article
2019 Seventh International Conference on Digital Information Processing and Communications (ICDIPC), 05/2019, pp. 47 - 51
In this study, by modifying standard JPEG compression algorithm, simultaneous compression, encryption and simultaneous decompression, decryption procedure is... 
Image coding | multimedia encoding | entropy coding | Transform coding | Clustering algorithms | image compression | Encoding | Encryption | Discrete cosine transforms | image encryption | Huffman coding | Standards
Conference Proceeding
International Journal of Information Security and Privacy, ISSN 1930-1650, 07/2009, Volume 3, Issue 3, pp. 37 - 54
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are... 
Multimedia | Steganography | Video | Watermarking | Encryption | Cryptography | Image | Bitrate | Privacy | Images | Computer information security | Standards
Journal Article
2020, Advances in Intelligent Systems and Computing, ISBN 9789811374029, Volume 937, 782
The book covers cutting-edge and advanced research in modelling and graphics. Gathering high-quality papers presented at the First International Conference on... 
Image processing-Digital techniques-Congresses | Engineering | Systems and Data Security | Signal, Image and Speech Processing | Image Processing and Computer Vision
eBook
IEEE Transactions on Big Data, ISSN 2332-7790, 3/2019, pp. 1 - 1
The increasing amount of data generated by space applications poses several challenges due to limited resources available onboard: power, memory, computation,... 
Spatial Light Modulators | Instruments | Compressed Sensing | Hyperspectral Imaging | Big Data | Aerospace electronics | Image reconstruction | Earth Observation | Planetary Exploration | Image coding | Imaging | Detectors | Space Applications | Compressive Imaging | Space Science | Sensors
Journal Article
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 08/2018, pp. 1 - 4
Basically half tone technique is used in Printing technology. The fundamental principle of half tone technique is to convert 8-bit pixel representation to... 
Image quality | hiding | Correlation | Image coding | Measurement uncertainty | scrambling | Data compression | Half tone | steganography | Doping | Encryption
Conference Proceeding
Eurasip Journal on Advances in Signal Processing, ISSN 1687-6172, 12/2017, Volume 2017, Issue 1, pp. 1 - 17
In this paper, a new method for image compression is proposed whose quality is demonstrated through accurate 3D reconstruction from 2D images. The method is... 
2D image compression | High-frequency minimization | DCT | 3D surface reconstruction | Concurrent binary search | ENGINEERING, ELECTRICAL & ELECTRONIC | Reconstruction | JPEG encoders-decoders | Algorithms | Images | Minimization | Encoding | Image compression | Image reconstruction
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.