Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference54 articles.
1. Abd-El-Hafiz SK, Radwan AG, Abdel Haleem SH, Barakat ML (2014) A fractal-based image encryption system. IET Image Process 8(12):742–752
2. Anjum F, Yadav S, Aafreen R, Hasan T (2016) A survey: secure data transmission using video steganography. Imperial Journal of Interdisciplinary Research (2.5)
3. Boho A, Van Wallendael G, Dooms A, De Cock J, Braeckman G, Schelkens P, Preneel B, Van de Walle R (2013) End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. IEEE Signal Process Mag 30(2):97–107
4. Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern Syst 43(4):996–1002. doi: 10.1109/TSMCA.2012.2223670
5. Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technol 10:131–137. doi: 10.1016/j.protcy.2013.12.345
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献