The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The multimedia big data in multimedia sensing and other IoT (Internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned...
Battery-powered unmanned aerial vehicle based video sensing system is more cost-saving and energy-saving than traditional aircraft based systems. However, high-volume real-time sensing data is more vulnerable in unmanned system than that in manned system. Meanwhile, the computation and energy resources in such system are very limited, which restricts the use of complex encryption process on video...
In embedded video sensing system, real-time video data is high-volume. Meanwhile, the computation and energy resources are very limited, which restricts the usage of complex encryption process on video data. Therefore the confidentiality of video data under limited resources needs to be addressed. Firstly, dissymmetry with its trend between data volume and limited resources has been studied, while...
Video and audio streams in large-scale multimedia sensing system are high-volume, while computation and power resources are very scarce, which restricts the usage of complex data security process on multimedia data. Therefore, the confidentiality of video data under resources constraints is studied in this paper. Firstly, the trend of resources constraints is discussed, and an analysis model for multimedia...
Security video communication is a challenging task, especially for wireless video applications. A perceptual video encryption scheme is proposed based on exploiting the special feature of entropy coding in H.264. The encryption scheme is compose of coded block pattern permutation, sign of trailing ones scrambling and levels of nonzero coefficients encryption. The important syntax elements and sensitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.