Search
Now showing items 1-4 of 4
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
(Elsevier, 2017-05)
Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)
Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and ...
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09)
: For the estimation of cycle time in WLANs different parameters were used to
analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This
paper proposes a model to control all ...
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ...