Sciweavers

Share
7 search results - page 1 / 2
» Extending the Selective MPEG Encryption Algorithm PVEA
Sort
View
IIHMSP
2006
IEEE
126views Multimedia» more  IIHMSP 2006»
12 years 4 months ago
Extending the Selective MPEG Encryption Algorithm PVEA
Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising can...
Li Weng, Karel Wouters, Bart Preneel
ITIIS
2010
129views more  ITIIS 2010»
11 years 4 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
MAM
2006
95views more  MAM 2006»
11 years 10 months ago
A selective DVS technique based on battery residual
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Sukwon Choi, Hojung Cha, Rhan Ha
PCM
2004
Springer
108views Multimedia» more  PCM 2004»
12 years 3 months ago
MPEG-4 Video Retrieval Using Video-Objects and Edge Potential Functions
A novel video retrieval tool based on MPEG-4 video object (VO) representation is presented. The algorithm extends the concept of edge potential functions (EPF), already used in sha...
Minh-Son Dao, Francesco G. B. De Natale, Andrea Ma...
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
12 years 4 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
books