2019 3rd International Conference on Advanced Information and Communications Technologies (AICT) 2019
DOI: 10.1109/aiact.2019.8847897
|View full text |Cite
|
Sign up to set email alerts
|

Development Second and Third Phase of the Selective Frame Processing Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
6

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 12 publications
0
6
0
6
Order By: Relevance
“…The most widely used approach is defined as sequential. It is used in [10][11][12] and provides for the sequential execution of compression and encryption transformations. So, in [10], a general version of the sequential scheme for ensuring the safety of different types of data is presented.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…The most widely used approach is defined as sequential. It is used in [10][11][12] and provides for the sequential execution of compression and encryption transformations. So, in [10], a general version of the sequential scheme for ensuring the safety of different types of data is presented.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…So, in [10], a general version of the sequential scheme for ensuring the safety of different types of data is presented. In [12], it is considered from the standpoint of ensuring the safety of video images. To ensure the confidentiality of video images in the sequential scheme, well-known and well-tested standards for cryptographic transformations are used.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…On the one hand, it is a requirement to increase the availability and integrity of providing video information services, which leads to an increase in their information intensity. On the other hand, the presence of a number of restrictions [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]. Such restrictions relate to the characteristics of infocommunication technologies, including those using a wireless data tract.…”
Section: Introductionmentioning
confidence: 99%