Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2009 International Conference on Image Analysis and Signal Processing 2009
DOI: 10.1109/iasp.2009.5054669
|View full text |Cite
|
Sign up to set email alerts
|

Applied image processing to multimedia information security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…With the continuous improvement of scientific and technological levels and the continuous development of Internet technology, it has been widely used in many fields. The transmission of large-scale data information on the Internet network [1][2] needs to play a more critical role in increasing its security and data protection [3]. However, multimedia data information system has their vulnerability because there is much hardware in data information protection system, and the shortcomings of software or data information security methods will lead to significant security risks [4][5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the continuous improvement of scientific and technological levels and the continuous development of Internet technology, it has been widely used in many fields. The transmission of large-scale data information on the Internet network [1][2] needs to play a more critical role in increasing its security and data protection [3]. However, multimedia data information system has their vulnerability because there is much hardware in data information protection system, and the shortcomings of software or data information security methods will lead to significant security risks [4][5].…”
Section: Introductionmentioning
confidence: 99%
“…The cross operation is typically carried out from three angles (1) good genetic factors have the chance of inheritance and inheritance to the next generation. (2) Can have excellent gene results for the results of cross-operation (3). The crossover scheme has a great relationship with the coding of the J. Zhao…”
mentioning
confidence: 99%
“…Secret key in symmetric encryption means that both the sender and the receiver agree on a single key for their communication; it is used to encrypt and to decrypt the data. While public key in asymmetric encryption through which everyone can encrypt data, but cannot decrypt it; only the person holding the secret key can decrypt this, such as RSA and ElGamal [17]. In block image cipher encrypt one block of input to process a block of output have the same size based on the same key then proceed to the next block.…”
Section: Image Encryptionmentioning
confidence: 99%
“…Large number of neurons is required to achieving high security. The decryption is achieved in three steps [4][5] [12]. During the first step, the impurity which was varying with respect to position of pixel is removed.…”
Section: B Decryption Modulementioning
confidence: 99%
“…Whether it is image processing or otherwise, most of the algorithms used are generic, because of which the key exchange has become a prerequisite prior to exchange of the data [4]. Hence the strength of such encryption solely lies on the key length.…”
Section: Introductionmentioning
confidence: 99%