Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising can...
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
A novel video retrieval tool based on MPEG-4 video object (VO) representation is presented. The algorithm extends the concept of edge potential functions (EPF), already used in sha...
Minh-Son Dao, Francesco G. B. De Natale, Andrea Ma...
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...