Search
Now showing items 1-10 of 14
MIKEY and SRTP integration for multicast streaming.
(Euro Journals, 2006)
This paper presents the design and implementation of key management architecture
for secure multimedia audio streaming to multicast receivers. It describes the methods and
techniques which are used in making a multicast ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Data driven approach for eye disease classification with machine learning.
(MDPI, 2019-07-11)
Medical health systems have been concentrating on artificial intelligence techniques for
speedy diagnosis. However, the recording of health data in a standard form still requires attention so
that machine learning can ...
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
(Elsevier, 2017-05)
Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ...
SLEPX: an efficient lightweight cipher for visual protection of scalable HEVC extension
(IEEE, 2020-10-12)
This paper proposes a lightweight cipher scheme aimed at the scalable extension of the High Efficiency Video Coding (HEVC) codec, referred to as the Scalable HEVC (SHVC) standard. This stream cipher, S ymmetric Cipher for ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)
Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and ...
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ...
Lightweight cipher for H.264 videos in the Internet of Multimedia Things with encryption space ratio diagnostics
(MDPI, 2019-03-11)
Within an Internet of Multimedia Things, the risk of disclosing streamed video content,
such as that arising from video surveillance, is of heightened concern. This leads to the encryption
of that content. To reduce the ...
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09)
: For the estimation of cycle time in WLANs different parameters were used to
analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This
paper proposes a model to control all ...
Towards estimation of emotions from eye pupillometry with low-cost devices
(IEEE, 2021-01-11)
Emotional care is important for some patients and their caregivers. Within a clinical or home care situation, technology can be employed to remotely monitor the emotional response of such people. This paper considers ...