Secure edge computing-assisted video reporting service in 5G-enabled vehicular networks

H Zhong, L Wang, J Cui, J Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Since traffic accidents occur frequently, a real-time video traffic reporting service is
necessary in vehicular networks for a prompt response to accidents. Although the fifth …

Smart fog-based video surveillance with privacy preservation based on blockchain

M Dave, V Rastogi, M Miglani, P Saharan… - Wireless Personal …, 2022 - Springer
Security surveillance of home or office premises is usually performed by deploying a number
of video cameras to continuously monitor the environment. Such monitoring has a potential …

Privacy‐preserving remote sensing images recognition based on limited visual cryptography

D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …

A Hierarchical encryption and key management scheme for layered access control on H. 264/SVC bitstream in the internet of things

C Xu, W Ren, L Yu, T Zhu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Terminals with diverse technological specifications, heterogeneous network environment,
and personalized user requirements raise new challenges to streaming media services …

Decentralized video input authentication as an edge service for smart cities

R Xu, D Nagothu, Y Chen - IEEE Consumer Electronics …, 2021 - ieeexplore.ieee.org
Situational awareness is essential for a safe and sustainable urban environment. While the
wide deployment of Internet of Video Things (IoVT) enables efficient monitoring of the …

SC-DVR: a secure cloud computing based framework for DVR service

J Son, R Hussain, H Kim, H Oh - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Typical digital video recorders (DVRs) have limited storage capacity, and it is not easy for
them to share content among user devices. However, if DVRs are extended to the cloud …

Low-cost and confidentiality-preserving data acquisition for internet of multimedia things

Y Zhang, Q He, Y Xiang, LY Zhang… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Multimedia Things (IoMT) faces the challenge of how to realize low-cost data
acquisition while still preserve data confidentiality. In this paper, we present a low-cost and …

An efficient adaptive of transparent spatial digital image encryption

OA Khashan, AM Zin - Procedia technology, 2013 - Elsevier
Digital images are important information often contain high confidential and secret data
need to be protected. Due to the growth in the adoption of multimedia technologies, many …

An encryption method for mobile video surveillance system based on ZUC algorithm

H Zeng, L Ji - Procedia computer science, 2018 - Elsevier
With the development of society, the advancement of science and technology, and the
improvement of the quality of life, more and more attention has been paid on the security …

A multithreaded programming approach for multimedia big data: encryption system

S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2018 - Springer
Multimedia is currently seen to dominate the internet network and the mobile network traffic;
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …