Art
J-GLOBAL ID:202002289356375153
Reference number:20A1192836
Extended EtC Images for Flexible Data Hiding and Extracting
柔軟な情報埋込みと抽出を可能とする拡張されたEtC画像
-
Publisher site
Copy service
{{ this.onShowCLink("http://jdream3.com/copy/?sid=JGLOBAL&noSystem=1&documentNoArray=20A1192836©=1") }}
-
Access JDreamⅢ for advanced search and analysis.
{{ this.onShowJLink("http://jdream3.com/lp/jglobal/index.html?docNo=20A1192836&from=J-GLOBAL&jstjournalNo=S0532B") }}
Author (3):
,
,
Material:
Volume:
119
Issue:
463(EMM2019 102-129)(Web)
Page:
43-48 (WEB ONLY)
Publication year:
Feb. 27, 2020
JST Material Number:
S0532B
ISSN:
0913-5685
Document type:
Proceedings
Article type:
原著論文
Country of issue:
Japan (JPN)
Language:
JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
,
,
,
Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
,
JST classification (2):
JST classification
Category name(code) classified by JST.
Code theory
, Graphic and image processing in general
Reference (25):
-
W. Liu, W. Zeng L. Dong, and Q. Yao, ′′Efficient compression of encrypted grayscale images,′′ IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, 2010.
-
X. Zhang, ′′Lossy compression and iterative reconstruction for encrypted image,′′ IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53-58, 2011.
-
J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, ′′Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation,′′ IEEE Trans. Inf. Forensics Security, vol. 9, no.1, pp. 39-50, 2014.
-
M. Kumar and A. Vaish, ′′An efficient encryption-thencompression technique for encrypted image using SVD,′′ Digital Signal Processing, vol. 60, pp. 81-89, 2017.
-
O. Watanabe, A. Uchida, T. Fukuhara, and H. Kiya, ′′An encryption-then-compression system for JPEG 2000 standard,′′ in Proc. IEEE ICASSP, no. IVMSP-L4.1, pp. 1226-1230, 2015.
more...
Terms in the title (3):
Terms in the title
Keywords automatically extracted from the title.
,
,
Return to Previous Page