Works matching DE "MULTIMEDIA system security"
Results: 21
A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2014, v. 22, n. 5, p. 1354, doi. 10.3906/elk-1212-75
- By:
- Publication type:
- Article
Framework for Secure Routing for Shielding the Multimedia Contents in P2P Network.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 11, p. 2671
- By:
- Publication type:
- Article
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling.
- Published in:
- Journal of Multimedia, 2010, v. 5, n. 5, p. 464, doi. 10.4304/jmm.5.5.464-472
- Publication type:
- Article
Modern methods of computer steganography systematization.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 209, doi. 10.18372/2225-5036.19.5628
- By:
- Publication type:
- Article
Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC).
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5115, doi. 10.1007/s11277-017-4771-5
- By:
- Publication type:
- Article
Modified cyber kill chain model for multimedia service environments.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3153, doi. 10.1007/s11042-018-5897-5
- By:
- Publication type:
- Article
Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT).
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18201, doi. 10.1007/s11042-018-5963-z
- By:
- Publication type:
- Article
Attacks on 'a provably secure and efficient authentication scheme for access control in mobile pay-TV systems'.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 1525, doi. 10.1007/s11042-017-4377-7
- By:
- Publication type:
- Article
Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 19, p. 19983, doi. 10.1007/s11042-016-4016-8
- By:
- Publication type:
- Article
A priority for WSN in ubiquitous environment: multimedia security requirements.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 19, p. 20027, doi. 10.1007/s11042-016-4216-2
- By:
- Publication type:
- Article
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 3, p. 3235, doi. 10.1007/s11042-016-3710-x
- By:
- Publication type:
- Article
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 2, p. 2569, doi. 10.1007/s11042-015-3224-y
- By:
- Publication type:
- Article
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13995, doi. 10.1007/s11042-015-2929-2
- By:
- Publication type:
- Article
Reversible secret image sharing scheme in encrypted images.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13931, doi. 10.1007/s11042-016-3844-x
- By:
- Publication type:
- Article
On the effects of sender-receiver concealment mismatch on multimedia communication optimization.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 9, p. 2879, doi. 10.1007/s11042-013-1751-y
- By:
- Publication type:
- Article
A novel image cipher based on mixed transformed logistic maps.
- Published in:
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 315, doi. 10.1007/s11042-010-0652-6
- By:
- Publication type:
- Article
A high capacity data hiding algorithm for H.264/AVC video.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2947, doi. 10.1002/sec.1221
- By:
- Publication type:
- Article
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2017, v. 43, n. 1, p. 44, doi. 10.25195/2017/4318
- By:
- Publication type:
- Article
Routing management for performance and security tradeoff in wireless mesh networks.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 1, p. 35, doi. 10.1007/s10207-014-0246-9
- By:
- Publication type:
- Article
A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 221, doi. 10.1007/s11235-009-9261-y
- By:
- Publication type:
- Article
CDSP: A Solution for Privacy and Security of Multimedia Information Processing in Industrial Big Data and Internet of Things.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 3, p. 556, doi. 10.3390/s19030556
- By:
- Publication type:
- Article