default search action
International Journal of Multimedia Intelligence and Security, Volume 3
Volume 3, Number 1, 2013
- Jiajun Mao, Zhenyong Chen, Wei Fan, Zhang Xiong:
Line covering method and its applications in steganography and steganalysis. 1-22 - Varalakshmi Kumar, Gnanou Florence Sudha, Ilamparuthi Paruthi:
Performance analysis of secured video transmission over 3G networks based on H.264/AVC. 23-50 - Tao Gao, Guo Li, Ping Wang, Chengshan Wang:
Camera detection through internet of video sensors. 51-62 - Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Zhang Xiong:
A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication. 63-79 - Sheetal Kalra, Sandeep K. Sood:
Efficient password-authenticated key agreement protocol for smart cards based on ECC. 80-92 - Zhiguo Yang, Yuxin Peng, Jianguo Xiao:
Vocabulary hierarchy optimisation based on spatial context and category information. 93-107
Volume 3, Number 2, 2018
- Jalesh Kumar, Shivananda Nirmala:
A novel approach for enhancing the security of information content of an image. 109-128 - P. Viswanathan, P. Venkata Krishna:
Region-based colour image spatial fusion steganographic system. 129-145 - Rajeev Kumar, Satish Chand, Samayveer Singh:
A reversible high capacity data hiding scheme using combinatorial strategy. 146-161 - Yun Gao, Xin Wei, Liang Zhou, Mohsen Guizani:
QoE in multimedia domain: a user-centric quality assessment. 162-186 - Shushan Zhao, Wenhui Hu:
Improvement on OTP authentication and a possession-based authentication framework. 187-203
Volume 3, Number 3, 2019
- Dhwani Patel, Manik Lal Das:
TIDE: tampered image detection using mutual information. 205-220 - Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha:
Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies. 221-243 - Md. Sadiqur Rahman Sohel, Chowdhury Nawrin Ferdous, Ashikur Rahman, Akib Jawad Nafis, Salsabil Arabi Shushmi, Raqeebir Rab:
On constructing contention aware connected dominating sets for inter-connectivity among internet of things devices. 244-270 - Hamza Al Maharmeh, Mohammad Alhawari, Chung-Chih Hung, Mohammed Ismail:
Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. 271-292 - Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous:
A new method of combining colour, texture and shape features using the genetic algorithm for image retrieval. 293-319
Volume 3, Number 4, 2020
- Ali Gounni, Noureddine Rais, Mostafa Idrissi Azzouzi:
Implementation of liquefied natural gas as an alternative fuel technology using stochastic traffic: a case study for Morocco. 321-336 - Zakariyaa Ait El Mouden, Abdeslam Jakimi, Moha Hajar:
Unsupervised graph clustering for community detection in complex networks using spectral analysis. 337-347 - Fadwa Bouhafer, Anass El Haddadi, Mohammed Heyouni, Ouafaa Ben Ali:
XEW 2.0: big data analytics tool based on swarm intelligence. 348-370 - Leila Zahhafi, Omar Khadir:
An anonymous electronic voting scheme for multiple elections using a variant of the ElGamal digital signature. 371-382 - Anouar Abdelhakim Boudhir, Ikram Ben Abdel Ouahab, Mohamed Ben Ahmed, Lotfi Elaachak, Mohammed Bouhorma:
New generic approach based on cross compilation for securing IoT communications. 383-392 - Marouane Mzibri, Abdelilah Maach, Driss El Ghanami:
A supervised learning approach to estimating the urban traffic state based on floating car data. 393-406 - Khadija Elghomary, Driss Bouzidi, Najima Daoudi:
Study and review of OSN and SIoT trust models: towards a dynamic MOOC trust model. 407-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.