On the security of a clipped hopfield neural network-based cryptosystem
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Digital invisible ink and its applications in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Distributed keyless security for correlated data with applications in visual sensor networks
Proceedings of the 9th workshop on Multimedia & security
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
Transmission error and compression robustness of 2D chaotic map image encryption schemes
EURASIP Journal on Information Security
EURASIP Journal on Information Security
An integrated on-line audio watermark decoding scheme for broadcast monitoring
Multimedia Tools and Applications
Video protection for MPEG-4 FGS with watermarking
Multimedia Tools and Applications
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
Efficient in-network adaptation of encrypted H.264/SVC content
Image Communication
Adaptive chosen-ciphertext attack on secure arithmetic coding
IEEE Transactions on Signal Processing
Key Independent Retrieval of Chaotic Encrypted Images
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
Digital image encoding using hyperchaos
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
A new video encryption scheme for H.264/AVC
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
On the security of multiple Huffman table based encryption
Journal of Visual Communication and Image Representation
Security in real time multimedia data based on generalized keys
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Collision-based flexible image encryption algorithm
Journal of Systems and Software
Puzzle: a novel video encryption algorithm
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Selective image encryption using JBIG
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Compression of encrypted visual data
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Lossless data hiding for high embedding capacity
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
High capacity lossless data hiding
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Ensuring confidentiality and integrity of multimedia data on multi-core platforms
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part II
Video fingerprinting system using wavelet and error correcting code
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A viable system for tracing illegal users of video
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |