首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   120篇
  免费   16篇
  国内免费   6篇
电工技术   5篇
化学工业   1篇
金属工艺   1篇
机械仪表   1篇
石油天然气   1篇
武器工业   2篇
无线电   44篇
一般工业技术   2篇
自动化技术   85篇
  2024年   1篇
  2023年   2篇
  2022年   1篇
  2021年   4篇
  2020年   2篇
  2019年   1篇
  2018年   4篇
  2017年   1篇
  2016年   2篇
  2015年   4篇
  2014年   8篇
  2013年   4篇
  2012年   7篇
  2011年   5篇
  2010年   11篇
  2009年   7篇
  2008年   14篇
  2007年   5篇
  2006年   8篇
  2005年   7篇
  2004年   8篇
  2003年   8篇
  2002年   5篇
  2001年   4篇
  2000年   5篇
  1999年   6篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   2篇
  1993年   1篇
  1983年   2篇
排序方式: 共有142条查询结果,搜索用时 888 毫秒
81.
本文提出判定接不失真性的又一个必要条件,发现了连接不失真的充要条件。文中有关理论补充并推广了文献(1)中的有关理论。  相似文献   
82.
In this paper a novel reversible method for fast and safe image transfer is proposed. The method combines compression, data hiding and partial encryption of images in a single processing step. The proposed approach can embed data into the image according to the message size and partially encrypt the image and the message without changing the original image content. Moreover, during the same process the image is lossless compressed. Nevertheless, the compression rate depends on the upper bound of message size to embed in the image. The main idea is to decompose the original image into two sub-images and to apply various processes to each sub-image in order to gain space and increase the amount of embedded data. The two sub-images are then scrambled and partially encrypted. The most significant characteristic of the proposed method is the utilization of a single procedure to simultaneously perform the compression, the reversible data hiding and the partial encryption rather than using three separate procedures. Our approach reduces then the computational effort and the required computation time. This method is specially suited for medical images where one can associate the patient diagnostic to the concerned medical image for safe transfer purpose.  相似文献   
83.
Reversible hiding in DCT-based compressed images   总被引:2,自引:0,他引:2  
This paper presents a lossless and reversible steganography scheme for hiding secret data in each block of quantized discrete cosine transformation (DCT) coefficients in JPEG images. In this scheme, the two successive zero coefficients of the medium-frequency components in each block are used to hide the secret data. Furthermore, the scheme modifies the quantization table to maintain the quality of the stego-image. Experimental results also confirm that the proposed scheme can provide expected acceptable image quality of stego-images and successfully achieve reversibility.  相似文献   
84.
基于块参照像素的无损信息隐藏算法   总被引:1,自引:1,他引:0  
提出一种具有高嵌入容量的图像无损信息隐藏算法。首先将载体图像分成互不重叠的子块,然后在每块中选定一个参照像素,并计算参照像素与块内其它像素的差。在像素差直方图移位产生冗余空间之后,机密信息就可以无损地嵌入到这些冗余空间中。该方法在机密信息提取后可完全恢复载体图像,而且提取机密信息和恢复载体图像不需要除机密信息长度之外的任何信息。实验结果表明了该算法的有效性。  相似文献   
85.
In this paper, a novel method for lossless image encryption based on set partitioning in hierarchical trees and cellular automata. The proposed encryption method embeds the encryption into the compression process, in which a small part of the data is encrypted quickly, while maintaining the good coding characteristics of set partitioning in hierarchical trees (SPIHT). The proposed encryption system adopts three stages of scrambling and diffusion. In each stage of encryption, different chaotic systems are used to generate the plaintext-related key stream to maintain high security and to resist some attacks. Moreover, the channel length of the coded-and-compressed color image is more uncertain, resulting into higher difficulty for attackers to decipher the algorithm. The experimental results indicate that the length of bitstream is compressed to 50% of the original image, showing that our proposed algorithm has higher lossless compression ratio compared with the existing algorithms. Meanwhile, the encryption scheme passes the entropy analysis, sensitivity analysis, lossless recovery test, and SP800-22 test.  相似文献   
86.
本文主要介绍了编码的定义及编码的方法,并对离散信源编码的常用的哈夫曼编码方法做了比较详细的介绍,同时也对这编码方法在实现条件上做了分析,从编码效率上考虑该编码方法得实用性。  相似文献   
87.
第二代小波变换应用于图象的无损压缩编码   总被引:7,自引:1,他引:6       下载免费PDF全文
第二代小波变换构造方法的特点是:①继承了第一代小波变换的多分辨率特性:②不依赖傅立叶变换;③小波变换后的系数是整数;④图象的恢复质量与变换时边界采用何种延拓方式无关,利用了“整数经过第二代小波变换后的系数仍为整数”的特性,将第二代小波变换用于图象的无损压缩编码,并和Huffman编码、第一代小波变换压缩编码进行了比较,从比较结果来看,在能够无损重建图象的同时,第二代小波变换的压缩比要高于Hjffm  相似文献   
88.
Recent advancements in the capture and display technologies motivated the ITU-T Video Coding Experts Group and ISO/IEC Moving Picture Experts Group to jointly develop the High-Efficiency Video Coding (HEVC), a state-of-the-art video coding standard for efficient compression. The compression applications that essentially require lossless compression scenarios include medical imaging, video analytics, video surveillance, video streaming etc., where the content reconstruction should be flawless. In the proposed work, we present a gradient-oriented directional prediction (GDP) strategy at the pixel level to enhance the compression efficiency of the conventional block-based planar and angular intra prediction in the HEVC lossless mode. The detailed experimental analysis demonstrates that the proposed method outperforms the lossless mode of HEVC anchor in terms of bit-rate savings by 8.29%, 1.65%, 1.94% and 2.21% for Main-AI, LD, LDP and RA configurations respectively, without impairing the computational complexity. The experimental results also illustrates that the proposed predictor performs superior to the existing state-of-the-art techniques in the literature.  相似文献   
89.
BWT算法是目前广泛关注的一种基于块压缩的无损压缩算法。由BWT变换,MTF变换和熵编码三部分组成。本文对其做了具体介绍和分析并在此基础上提出了一种基于LFU缓冲区置换策略的MTF变换的改进方法,实验结果表明改进后的算法使压缩比有所提高。  相似文献   
90.
Most of the proposed methods of reversible data hiding based on difference expansion require location maps to recover cover images. Although the location map can be compressed by a lossless compression algorithm, this lowers embedding capacity and increases computational cost during the procedures of embedding and extracting. The study presents an adaptive reversible data scheme based on the prediction of difference expansion. Since each cover pixel generally resembles its surrounding pixels, most of the difference values between the cover pixels and their corresponding predictive pixels are small; therefore, the proposed scheme gains from embedding capacity by taking full advantage of the large quantities of smaller difference values where secret data can be embedded. The proposed scheme offers several advantages, namely, (1) the location map is no more required, (2) the embedding capacity can be adjusted depending on the practical applications, and (3) the high embedding capacity with minimal visual distortion can be achieved. Moreover, the experimental results demonstrate that the proposed scheme yields high embedding capacity by comparing the related schemes that are proposed recently.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号