2021
DOI: 10.1155/2021/7147940
|View full text |Cite
|
Sign up to set email alerts
|

A Metaheuristic Approach to Secure Multimedia Big Data for IoT‐Based Smart City Applications

Abstract: Media streaming falls into the category of Big Data. Regardless of the video duration, an enormous amount of information is encoded in accordance with standardized algorithms of videos. In the transmission of videos, the intended recipient is allowed to receive a copy of the broadcasted video; however, the adversary also has access to it which poses a serious concern to the data confidentiality and availability. In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the info… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…In order to realize the optimized, develop and design library management system [18][19][20][21][22][23][24][25], analyze with data mining technology flow characteristics of the library management, and the resource distribution characteristics of the library are analyzed in the cloud computing environment [26][27][28][29], which mainly includes the characteristics of associated knowledge base information [30], computing resources [31][32][33], physical resources and logical resources [34-38. The data flow resource distribution of library management see Figure 2.…”
Section: Analysis Of Library Information Managementmentioning
confidence: 99%
“…In order to realize the optimized, develop and design library management system [18][19][20][21][22][23][24][25], analyze with data mining technology flow characteristics of the library management, and the resource distribution characteristics of the library are analyzed in the cloud computing environment [26][27][28][29], which mainly includes the characteristics of associated knowledge base information [30], computing resources [31][32][33], physical resources and logical resources [34-38. The data flow resource distribution of library management see Figure 2.…”
Section: Analysis Of Library Information Managementmentioning
confidence: 99%
“…Select the set j S of output neurons j "adjacent neurons". Among them,   0 j S represents the "adjacent neuron" set of neuron j at time t=0,   t S j represents the set of "adjacent neurons" at time t. Area   t S j keeps shrinking with time [16] . ② Provide a new input mode X.…”
Section: Som Network Implementation Processmentioning
confidence: 99%
“…Lei, Y. will first introduce big data and artificial intelligence, after analyzing the application of artificial intelligence in computer networks in the current era of big data, in this way, it can be used as a reference for relevant people to communicate [13]. Xia, M. Can use the effective application of artificial intelligence virus detection and killing technology in enterprise information security situation awareness system can realize the effective identification and timely detection and killing of virus, and reduce the damage caused by virus to computer system [14][15][16][17][18].Because these studies have large loopholes, or the detection is not comprehensive enough, this paper proposes a method based on artificial intelligence on the basis of existing studies [19][20][21][22][23][24][25][26][27]. The design and deployment of the system, effective detection, threat perception, determination and threat risk tracking of information security threats can realize the comprehensive improvement of enterprises and their ability to detect security threats and security attacks [28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
“…Although face recognition technology is in continuous development and improvement [13][14][15][16][17][18][19][20], the recognition rate, anti-counterfeiting, fingerprint, retina, and other has a large gap [21][22][23][24][25]. The large passenger flow and complex environmental characteristics of urban rail transit also affect the application of face recognition technology in urban rail transit.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Face tracking function was tested for different face conditions, including single face, multiple faces, and face in and out or interleaved [50]. The system automatically initializes a tracking window before the face tracking starts, and assigns a Camshift tracker to each face in the video surveillance to realize multiple face recognition.…”
Section: Face Recognition Training Processmentioning
confidence: 99%