Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption
暂无分享,去创建一个
Sung Wook Baik | Jaime Lloret | Haoxiang Wang | Jamil Ahmad | Khan Muhammad | Rafik Hamza | Jaime Lloret | Khan Muhammad | S. Baik | Jamil Ahmad | Haoxiang Wang | Rafik Hamza
[1] Rafik Hamza,et al. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..
[2] Jaime Lloret,et al. A Wireless Sensor Network for Vineyard Monitoring That Uses Image Processing , 2011, Sensors.
[3] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[4] David S. Rosenblum,et al. From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.
[5] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[6] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.
[7] Luming Zhang,et al. Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.
[8] Shiguo Lian,et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..
[9] Mohammad Reza Mosavi,et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process , 2012, Multimedia Tools and Applications.
[10] Sung Wook Baik,et al. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.
[11] Zhihan Lv,et al. Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..
[12] Jaime Lloret,et al. An Intelligent handover process algorithm in 5G networks: The use case of mobile cameras for environmental surveillance , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[13] Bin Wang,et al. Encryption Method Based on a New Secret Key Algorithm for Color Images , 2016 .
[14] Amit K. Roy-Chowdhury,et al. Multi-View Surveillance Video Summarization via Joint Embedding and Sparse Optimization , 2017, IEEE Transactions on Multimedia.
[15] Ming Wang,et al. Energy-Aware Concurrent Multipath Transfer for Real-Time Video Streaming Over Heterogeneous Wireless Networks , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Sung Wook Baik,et al. Saliency-directed prioritization of visual data in wireless surveillance networks , 2015, Inf. Fusion.
[17] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[18] Yicong Zhou,et al. Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..
[19] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[20] Guang Li,et al. An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.
[21] Amir Akhavan,et al. A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..
[22] Sung Wook Baik,et al. Sparse Representations-Based Super-Resolution of Key-Frames Extracted from Frames-Sequences Generated by a Visual Sensor Network , 2014, Sensors.
[23] Xiaoling Huang,et al. Image encryption algorithm using chaotic Chebyshev generator , 2011, Nonlinear Dynamics.
[24] J. Lloret,et al. 802.11g WLANs Design for Rural Environments Video-surveillance , 2006, International Conference on Digital Telecommunications (ICDT'06).
[25] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[26] Abderrahim Saaidi,et al. A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher , 2015 .
[27] Sung Wook Baik,et al. Efficient visual attention driven framework for key frames extraction from hysteroscopy videos , 2017, Biomed. Signal Process. Control..
[28] Lu Xu,et al. A novel bit-level image encryption algorithm based on chaotic maps , 2016 .
[29] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.
[30] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[31] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .