A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling
暂无分享,去创建一个
[1] Bernd Freisleben,et al. Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants , 2007, OTM Conferences.
[2] R. Smid,et al. New interpolation methods for image-based sub-pixel displacement measurement based on correlation , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.
[3] Wageeh Boles,et al. A suspicious behaviour detection using a context space model for smart surveillance systems , 2012, Comput. Vis. Image Underst..
[4] Jill Slay,et al. Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[5] R.E. Hiromoto,et al. Assessing the Communication Issues Involved in Implemening High-Level Behaviors in Unmanned Aerial Vehicles , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[6] N. S. Alex,et al. Enhanced image secret sharing via error diffusion in halftone visual cryptography , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[7] N. S. Alex,et al. Visual cryptography using hybrid halftoning and inter-pixel exchanging , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[8] Anita Sahoo,et al. Variable Bits Secure System for Color Images , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[9] S. C. Hui,et al. Remote Video Monitoring Over the WWW , 2003, Multimedia Tools and Applications.
[10] S. K. Changchien,et al. A new Pixel-Chaotic-Shuffle method for image encryption , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Punam Bedi,et al. Securing fingerprint images using a hybrid technique , 2012, ICACCI '12.
[13] Panagiotis Kalagiakos,et al. Cloud Computing learning , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[14] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[15] Norshuhani Zamin. Information Extraction for Counter-Terrorism: A Survey , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.
[16] Carlos E. Palau,et al. A video streaming application for urban traffic management , 2007, J. Netw. Comput. Appl..
[17] Li Li,et al. Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Martin Watmough,et al. Future Supply Chain Processes and Data for Collective Intelligence , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[19] Ruhua Cai,et al. Image encryption algorithm based on bit-plane scrambling and multiple chaotic systems combination , 2010, 2010 International Conference on Intelligent Computing and Integrated Systems.
[20] Zheng Wei,et al. Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[21] Jörg Hähner,et al. MIDSCA: Towards a Smart Camera architecture of mobile internet devices , 2008, 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras.
[22] Kannabiran Ganesan,et al. Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps , 2008, 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation.
[23] Feng Zhao. Wireless sensor networks: seamless computing across the physical and digital worlds , 2004, VSSN '04.
[24] Wen Gao,et al. Vlogging: A survey of videoblogging technology on the web , 2010, CSUR.
[25] Ebroul Izquierdo. Knowledge-Based Image Processing for Classification and Recognition in Surveillance Applications , 2006, 2006 International Conference on Image Processing.
[26] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[27] A. Aisha Al-Abdallah,et al. Real-time traffic surveillance using ZigBee , 2010, 2010 International Conference On Computer Design and Applications.
[28] Alireza Jolfaei,et al. A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.
[29] Sung Bum Pan,et al. The Multi-Modal Human Identification Based on Smartcard in Video Surveillance System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[30] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[31] K. M. Koumadi,et al. Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[32] Jochen Schlick. Cyber-physical systems in factory automation - Towards the 4th industrial revolution , 2012, 2012 9th IEEE International Workshop on Factory Communication Systems.
[33] Amitesh Singh Rajput,et al. Towards the growth of image encryption and authentication schemes , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[34] Feng Liu,et al. Colour visual cryptography schemes , 2008, IET Inf. Secur..
[35] Hitoshi Kiya,et al. A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000 , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[36] Mengmeng Wang,et al. Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[37] Sehchan Oh,et al. A platform surveillance monitoring system using image processing for passenger safety in railway station , 2007, 2007 International Conference on Control, Automation and Systems.
[38] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[39] Hyeon Park,et al. Large Data Transport for Real-Time Services in Sensor Networks , 2009, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns.
[40] T. W. Lawrence,et al. The future of surface surveillance-revolutionizing the view of the battlefield , 2000, Record of the IEEE 2000 International Radar Conference [Cat. No. 00CH37037].