M Dave, V Rastogi, M Miglani, P Saharan… - Wireless Personal …, 2022 - Springer
Security surveillance of home or office premises is usually performed by deploying a number of video cameras to continuously monitor the environment. Such monitoring has a potential …
D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT), this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
C Xu, W Ren, L Yu, T Zhu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Terminals with diverse technological specifications, heterogeneous network environment, and personalized user requirements raise new challenges to streaming media services …
R Xu, D Nagothu, Y Chen - IEEE Consumer Electronics …, 2021 - ieeexplore.ieee.org
Situational awareness is essential for a safe and sustainable urban environment. While the wide deployment of Internet of Video Things (IoVT) enables efficient monitoring of the …
J Son, R Hussain, H Kim, H Oh - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy for them to share content among user devices. However, if DVRs are extended to the cloud …
Internet of Multimedia Things (IoMT) faces the challenge of how to realize low-cost data acquisition while still preserve data confidentiality. In this paper, we present a low-cost and …
OA Khashan, AM Zin - Procedia technology, 2013 - Elsevier
Digital images are important information often contain high confidential and secret data need to be protected. Due to the growth in the adoption of multimedia technologies, many …
H Zeng, L Ji - Procedia computer science, 2018 - Elsevier
With the development of society, the advancement of science and technology, and the improvement of the quality of life, more and more attention has been paid on the security …
Multimedia is currently seen to dominate the internet network and the mobile network traffic; hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …