Visual evaluation, scaling and transport of secure videos
暂无分享,去创建一个
[1] Christian Timmerer,et al. Bitstream syntax description: a tool for multimedia resource adaptation within MPEG-21 , 2003, Signal Process. Image Commun..
[2] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Alan C. Bovik,et al. Image information and visual quality , 2006, IEEE Trans. Image Process..
[4] Béatrice Pesquet-Popescu,et al. Scalable and Media Aware Adaptive Video Streaming over Wireless Networks , 2008, EURASIP J. Adv. Signal Process..
[5] Nikolay N. Ponomarenko,et al. METRICS PERFORMANCE COMPARISON FOR COLOR IMAGE DATABASE , 2008 .
[6] Douglas Sicker,et al. Selective encryption for consumer applications , 2004, CCNC.
[7] Yongdong Zhang,et al. Visual security evaluation for video encryption , 2010, ACM Multimedia.
[8] F. Wrba,et al. Pit pattern classification using extended Local Binary Patterns , 2009, 2009 9th International Conference on Information Technology and Applications in Biomedicine.
[9] Amir Said. Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.
[10] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[11] Miska M. Hannuksela,et al. RTP Payload Format for H.264 Video , 2005, RFC.
[12] Henning Schulzrinne,et al. Real Time Streaming Protocol (RTSP) , 1998, RFC.
[13] Itu-T and Iso Iec Jtc. Advanced video coding for generic audiovisual services , 2010 .
[14] Thomas Stütz,et al. A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[16] Andreas Uhl,et al. Iris Recognition: From Segmentation to Template Security , 2012 .
[17] Florent Autrusseau,et al. Toward a simplified perceptual quality metric for watermarking applications , 2010, Electronic Imaging.
[18] Andreas Uhl,et al. Selective encryption of the MC-EZBC bitstream and residual information , 2010, 2010 18th European Signal Processing Conference.
[19] Miska M. Hannuksela,et al. System and Transport Interface of SVC , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[20] A. Uhl,et al. Cost of in-network adaption of MC-EZBC for universal multimedia access , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[21] Thomas Stütz,et al. Efficient in-network adaptation of encrypted H.264/SVC content , 2009, Signal Process. Image Commun..
[22] Mohammed Ghanbari,et al. Scope of validity of PSNR in image/video quality assessment , 2008 .
[23] Alberto Signoroni,et al. State-of-the-Art and Trends in Scalable Video Compression With Wavelet-Based Approaches , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[24] Andreas Uhl,et al. Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.
[25] Thomas Stütz,et al. Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking , 2010, Communications and Multimedia Security.
[26] Barry E. Mullins,et al. An analysis of XML compression efficiency , 2007, ExpCS '07.
[27] Sos S. Agaian,et al. Simultaneous Encryption/Compression of Images Using Alpha Rooting , 2008, Data Compression Conference (dcc 2008).
[28] Jin Liu,et al. An objective visual security assessment for cipher-images based on local entropy , 2011, Multimedia Tools and Applications.
[29] Nikolay N. Ponomarenko,et al. Color image database for evaluation of image quality metrics , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[30] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[31] M. Kendall. A NEW MEASURE OF RANK CORRELATION , 1938 .
[32] Touradj Ebrahimi,et al. From the guest editors - Universal multimedia access , 2003 .
[33] John W. Woods,et al. Bidirectional MC-EZBC with lifting implementation , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Alan C. Bovik,et al. A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.
[35] C. Spearman. The proof and measurement of association between two things. , 2015, International journal of epidemiology.
[36] Min Wu,et al. Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[37] Shengcai Liao,et al. Learning Multi-scale Block Local Binary Patterns for Face Recognition , 2007, ICB.
[38] Sheila S. Hemami,et al. Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[39] Nikolay N. Ponomarenko,et al. TID2008 – A database for evaluation of full-reference visual quality assessment metrics , 2004 .