2009 International Conference on Environmental Science and Information Application Technology 2009
DOI: 10.1109/esiat.2009.76
|View full text |Cite
|
Sign up to set email alerts
|

Research on Lossy Compression Technology about the Encrypt Coding Image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…For fast transmission and protection of information, ETC is carried out in two steps [5]. The first step is an operation of encryption to modify the information and make them unreadable format [10]. The second step is an operation of compression in which the size of information to be transmitted is reduced by removing redundant information.…”
mentioning
confidence: 99%
“…For fast transmission and protection of information, ETC is carried out in two steps [5]. The first step is an operation of encryption to modify the information and make them unreadable format [10]. The second step is an operation of compression in which the size of information to be transmitted is reduced by removing redundant information.…”
mentioning
confidence: 99%