Author:
Mostefaoui A.,Noura H.,Fawaz Z.
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference54 articles.
1. Internet of things: vision, applications and research challenges;Miorandi;Ad Hoc Netw.,2012
2. Image quality assessment: from error visibility to structural similarity;Wang;IEEE Trans. Image Process.,2004
3. A. Massoudi, F. Lefebvre, C. De Vleeschouwer, F.-O. Devaux, Secure and low cost selective encryption for JPEG2000, in: ISM, 2008, pp. 31–38.
4. A novel image encryption based on hash function with only two-round diffusion process;Norouzi;Multimedia Syst.,2014
5. Voronoi diagrams a survey of a fundamental geometric data structure;Aurenhammer;ACM Comput. Surv. (CSUR),1991
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献