2014
DOI: 10.4304/jcp.9.1.52-58
|View full text |Cite
|
Sign up to set email alerts
|

Research on Channel-Multiplexed Home Intercom System Based on VoIP

Abstract: In this paper, we propose an intelligent channelmultiplexed home intercom system based on Voice over IP (VoIP), which is different from traditional home intercom system. The transmissions of audio and video signal are both supported in the system. According to different functions, the system is mainly divided into two modules: VoIP module and master control module. VoIP module consists of driver, OS Kernel and application layer, which can guarantee multiple tasks to be processed at the same time and ensure the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
(5 reference statements)
0
1
0
Order By: Relevance
“…According to the format of the image data to be protected, a number of important of component, including pixels (samples), bit-planes, line, blocks, macro-blocks, slices, transform coefficients and tree nodes, can be permuted. In last two decades, a number of permutation techniques were proposed to address the image security in digital data communication [4,5].The secrecy of keys and the familiarity of the keys are only given to the authorized users of the systems enhance the entire security of the cryptographic system. The security of image implemented through the key generation from an image will be stored in the database is more advanced cryptography method.…”
Section: Introductionmentioning
confidence: 99%
“…According to the format of the image data to be protected, a number of important of component, including pixels (samples), bit-planes, line, blocks, macro-blocks, slices, transform coefficients and tree nodes, can be permuted. In last two decades, a number of permutation techniques were proposed to address the image security in digital data communication [4,5].The secrecy of keys and the familiarity of the keys are only given to the authorized users of the systems enhance the entire security of the cryptographic system. The security of image implemented through the key generation from an image will be stored in the database is more advanced cryptography method.…”
Section: Introductionmentioning
confidence: 99%