Now showing items 1-5 of 5
Fuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, ...
Visual surveillance within the EU general data protection regulation: a technology perspective.
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and ...
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ...
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09)
: For the estimation of cycle time in WLANs different parameters were used to analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This paper proposes a model to control all ...