密度 发表于 2025-3-21 17:27:56

书目名称Embedded Multimedia Security Systems影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0307909<br><br>        <br><br>书目名称Embedded Multimedia Security Systems读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0307909<br><br>        <br><br>

floodgate 发表于 2025-3-21 23:44:06

https://doi.org/10.1057/978-1-137-58360-4mbedded multimedia systems. This approach alleviates the need of additional hardware for encryption in resource-constrained scenario, and can be otherwise used to augment existing encryption methods used for content delivery in Internet or other applications.

引导 发表于 2025-3-22 03:50:40

http://reply.papertrans.cn/31/3080/307909/307909_3.png

FLING 发表于 2025-3-22 07:17:47

Book 2013mpression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational c

考得 发表于 2025-3-22 09:16:19

http://reply.papertrans.cn/31/3080/307909/307909_5.png

Nonflammable 发表于 2025-3-22 13:57:01

http://reply.papertrans.cn/31/3080/307909/307909_6.png

Nonflammable 发表于 2025-3-22 20:20:15

http://reply.papertrans.cn/31/3080/307909/307909_7.png

大喘气 发表于 2025-3-22 23:58:00

Daoudi’s ,: Identity as Performancenamic switching between 5/3 and 9/7 wavelet filters and leads to a more power-efficient design. Further, a multiplier-free design with a low adder requirement demonstrates the potential of Poly-DWT for embedded systems. Through an FPGA prototype, we perform a quantitative analysis of our Poly-DWT ar

摇曳的微光 发表于 2025-3-23 02:28:13

The Play of Memory between Words and Images a zero-overhead implementation on custom hardware. Furthermore, a Look-up table-based reconfigurable implementation allows us to allocate the encryption key to the hardware at run-time. Direct implementation on Xilinx Virtex FPGA gave a clock frequency of 60 MHz, while a reconfigurable multiplier-b

Freeze 发表于 2025-3-23 09:23:07

Memory Culture and the Contemporary Citylysis against AC-based encryption techniques. These modes, namely Plaintext Modulation (PM), Pair-Wise-Independent Keys (PWIK), and Key and ciphertext Mixing (MIX) modes have insignificant computational overhead, while BCAC decoder has lower hardware requirements than BAC coder itself, making BCAC w
页: [1] 2 3 4
查看完整版本: Titlebook: Embedded Multimedia Security Systems; Algorithms and Archi Amit Pande,Joseph Zambreno Book 2013 Springer-Verlag London 2013 Embedded System