Author:
Padhy Sasmita,Dash Sachikanta,Shankar T. N.,Rachapudi Venubabu,Kumar Sandeep,Nayyar Anand
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference61 articles.
1. Agustsson E, Tschannen M, Mentzer F, Timofte R, Gool LV (2019) Generative adversarial networks for extreme learned image compression. In: Proceedings of the IEEE/CVF International conference on computer vision, pp 221–231
2. Ahmad I, Shin S (2021) A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process: Image Commun 98:116418
3. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75:6663–6682
4. Berghel H (2017) Equifax and the latest round of identity theft roulette. Comput 50(12):72–76
5. Boivin A, Lehoux P, Lacombe R, Burgers J, Grol R (2014) Involving patients in setting priorities for healthcare improvement: a cluster randomized trial. Implement Sci 9(1):1–10
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献