Academic literature on the topic 'Data encryption (Computer science) Image compression'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data encryption (Computer science) Image compression.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data encryption (Computer science) Image compression"
Ahmed, Mahmood Ali, and Khamees Khalaf Hasan. "Data Compression and Encryption for Remote Sensor Networks Using Different Techniques Methods." Journal of Cases on Information Technology 23, no. 2 (April 2021): 39–49. http://dx.doi.org/10.4018/jcit.20210401.oa4.
Full textHuang, Bin, Chun Wan, and Kaimeng Chen. "High-Capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Predictor and Compression of Prediction Errors." Mathematics 9, no. 17 (September 5, 2021): 2166. http://dx.doi.org/10.3390/math9172166.
Full textGa, H., and W. Zeng. "Image compression and encryption based on wavelet transform and chaos." Computer Optics 43, no. 2 (April 2019): 258–63. http://dx.doi.org/10.18287/2412-6179-2019-43-2-258-263.
Full textMehta, Garima, Malay Kishore Dutta, and Pyung Soo Kim. "An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory." International Journal of E-Health and Medical Communications 7, no. 4 (October 2016): 28–47. http://dx.doi.org/10.4018/ijehmc.2016100102.
Full textPrasad, Bhagwati, and Kunti Mishra. "A Combined Encryption Compression Scheme Using Chaotic Maps." Cybernetics and Information Technologies 13, no. 2 (June 1, 2013): 75–81. http://dx.doi.org/10.2478/cait-2013-0016.
Full textDengre, Amit, and A. D. Gawande. "Audio Encryption and Digital Image Watermarking in an Uncompress Video." International Journal of Advances in Applied Sciences 4, no. 2 (June 1, 2015): 66. http://dx.doi.org/10.11591/ijaas.v4.i2.pp66-72.
Full textTütüncü, Kemal, and Özcan Çataltaş. "Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach." Computer Science and Information Systems, no. 00 (2021): 48. http://dx.doi.org/10.2298/csis210227048t.
Full textTu, Rongxin, Wenying Wen, and Changsheng Hua. "An Unequal Image Privacy Protection Method Based on Saliency Detection." Security and Communication Networks 2020 (December 3, 2020): 1–13. http://dx.doi.org/10.1155/2020/8842376.
Full textWang, Jijun, and Soo Fun Tan. "Separable Reversible Data Hiding in Encryption Image with Two-Tuples Coding." Computers 10, no. 7 (July 7, 2021): 86. http://dx.doi.org/10.3390/computers10070086.
Full textGoldberg, Mark A. "Image data compression." Journal of Digital Imaging 11, S1 (August 1998): 230–32. http://dx.doi.org/10.1007/bf03168323.
Full textDissertations / Theses on the topic "Data encryption (Computer science) Image compression"
Maniccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Uehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textKoutsogiannis, Vassilis. "A study of color image data compression /." Online version of thesis, 1992. http://hdl.handle.net/1850/11060.
Full textLee, Joshua Ka-Wing. "A model-adaptive universal data compression architecture with applications to image compression." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111868.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 59-61).
In this thesis, I designed and implemented a model-adaptive data compression system for the compression of image data. The system is a realization and extension of the Model-Quantizer-Code-Separation Architecture for universal data compression which uses Low-Density-Parity-Check Codes for encoding and probabilistic graphical models and message-passing algorithms for decoding. We implement a lossless bi-level image data compressor as well as a lossy greyscale image compressor and explain how these compressors can rapidly adapt to changes in source models. We then show using these implementations that Restricted Boltzmann Machines are an effective source model for compressing image data compared to other compression methods by comparing compression performance using these source models on various image datasets.
by Joshua Ka-Wing Lee.
S.M.
Todd, Martin Peter. "Image data compression based on a multiresolution signal model." Thesis, University of Warwick, 1989. http://wrap.warwick.ac.uk/100937/.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textBhupathiraju, Kalyan Varma. "Empirical analysis of BWT-based lossless image compression." Morgantown, W. Va. : [West Virginia University Libraries], 2010. http://hdl.handle.net/10450/10958.
Full textTitle from document title page. Document formatted into pages; contains v, 61 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 54-56).
Jalumuri, Nandakishore R. "A study of scanning paths for BWT based image compression." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3633.
Full textTitle from document title page. Document formatted into pages; contains vii, 56 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 52-54).
Roth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textBooks on the topic "Data encryption (Computer science) Image compression"
name, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. Bellingham, WA: SPIE, 2003.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textSchmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2010.
Find full text(Society), SPIE, ed. Mathematics for signal and information processing: 2-5 August 2009, San Diego, California, United States. Bellingham, Wash: SPIE, 2009.
Find full textSalomon, David. Data Compression: The Complete Reference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
Find full textV, Prasad M., ed. Lossy image compression: Domain decomposition-based algorithms. London: Springer, 2011.
Find full textGlover, D. Subband coding for image data archiving. [Washington, DC: National Aeronautics and Space Administration, 1992.
Find full textFarrelle, Paul Michael. Recursive Block Coding for Image Data Compression. New York, NY: Springer New York, 1990.
Find full textBook chapters on the topic "Data encryption (Computer science) Image compression"
Pal, Arup Kumar, G. P. Biswas, and S. Mukhopadhyay. "An Efficient Compression-Encryption Scheme for Batch-Image." In Communications in Computer and Information Science, 85–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20209-4_12.
Full textTodd-Pokropek, A. "Image Data Compression Techniques: A Survey." In Mathematics and Computer Science in Medical Imaging, 167–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-83306-9_7.
Full textMoravie, P., H. Essafi, C. Lambert-Nebout, and J. L. Basille. "Real-time image compression using data-parallelism." In Lecture Notes in Computer Science, 723–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0020511.
Full textPogrebnyak, Oleksiy, Pablo Manrique Ramírez, Luis Pastor Sanchez Fernandez, and Roberto Sánchez Luna. "Data Dependent Wavelet Filtering for Lossless Image Compression." In Lecture Notes in Computer Science, 285–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11578079_30.
Full textKuroda, Hideo, Makoto Fujimura, and Kazumasa Hamano. "Considerations of Image Compression Scheme Hiding a Part of Coded Data into Own Image Coded Data." In Communications in Computer and Information Science, 312–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10546-3_37.
Full textHolt, Murray J. J. "A fast binary template matching algorithm for document image data compression." In Lecture Notes in Computer Science, 230–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/3-540-19036-8_22.
Full textShin, Sang Uk, Kyeong Seop Sim, and Kyung Hyune Rhee. "A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption." In Lecture Notes in Computer Science, 191–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_16.
Full textFujiyoshi, Masaaki, and Hitoshi Kiya. "Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression." In Lecture Notes in Computer Science, 225–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24078-7_22.
Full textLi, Wei-Soul, Wen-Shyong Hsieh, and Ming-Hong Sun. "Index LOCO-I: A Hybrid Method of Data Hiding and Image Compression." In Lecture Notes in Computer Science, 463–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11553939_66.
Full textShaw, Chandrama, Sukanta Das, and Biplab K. Sikdar. "Cellular Automata Based Encoding Technique for Wavelet Transformed Data Targeting Still Image Compression." In Lecture Notes in Computer Science, 141–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861201_19.
Full textConference papers on the topic "Data encryption (Computer science) Image compression"
Holtz, Klaus E., Eric S. Holtz, and Diana Kalienky. "Autosophy data/image compression and encryption." In Optical Science and Technology, the SPIE 49th Annual Meeting, edited by Mark S. Schmalz. SPIE, 2004. http://dx.doi.org/10.1117/12.549029.
Full textPhadikar, A., and S. P. Maity. "Quality access control of image by encryption and data hiding." In 2009 International Conference on Methods and Models in Computer Science (ICM2CS). IEEE, 2009. http://dx.doi.org/10.1109/icm2cs.2009.5397991.
Full text