Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing

Y Li, BS Shin - The Journal of Supercomputing, 2018 - Springer
Spatial crowdsourcing is a promising architecture for collecting various types of data online
with the aid of participants' powerful mobile devices. However, it is also associated with …

Speech authentication and recovery scheme in encrypted domain

Q Qian, H Wang, SM Abdullahi, H Wang… - Digital Forensics and …, 2017 - Springer
This paper proposes a self-embedding fragile watermarking scheme in encrypted speech
based on hyper-chaotic system and reference sharing mechanism. Hyper-chaotic system is …

Performance evaluation of video streaming in vehicular adhoc network

A Rahim, ZS Khan, F Bin Muhaya - … , ISA 2010, Miyazaki, Japan, June 23 …, 2010 - Springer
Abstract In Vehicular Ad-Hoc Networks (VANETs) wireless-equipped vehicles form a
temporary network for sharing information among vehicles. Secure Multimedia …

An Enhanced Audio Encryption Method using Unicode and Dynamic Message Mapping in Elliptic Curve Cryptography

M Sreekala, V Paul, TK Ratheesh… - INFOCOMP Journal of …, 2023 - infocomp.dcc.ufla.br
This paper presents a novel paradigm for audio cryptosystems that uses elliptic curve
encryption to secure audio data. It has the goal of increasing the level of security in digital …

一种基于Tent 混沌系统的音频加密方法

陈翎, 潘中良 - 装备制造技术, 2011 - cqvip.com
一种基于Tent混沌系统的音频加密方法-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车
充值 客服 首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术 …

Study on wireless sensor networks

T Jing, Y Shengwei, Y Bing… - … Conference on Intelligent …, 2010 - ieeexplore.ieee.org
Constant advances in Micro Electro-Mechanical System (MEMS) technology promote
miniaturization, low-cost and energy-efficiency of smart sensors. Meanwhile, Wireless …

A light weight and secure video conferencing scheme utilizing public network

T Meenpal - Multimedia Tools and Applications, 2017 - Springer
Security of video encryption schemes is an issue yet to be addressed to the satisfaction of all
parties concerned. In the one end of the spectrum, there are applications which require …

Chaos-based cryptography for voice secure wireless communication

SBS Al Maliky, R Saad - Multidisciplinary perspectives in cryptology …, 2014 - igi-global.com
Chaos theory was originally developed by mathematicians and physicists. The theory deals
with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such …

[PDF][PDF] Watermarking-Based Blind QoS Assessment for Wireless Image Communication.

H Wang, B Yin - J. Commun., 2013 - jocm.us
This paper presents a novel scheme to blindly estimate the quality of an image
communication link by means of an unconventional use of digital watermarking. The …

音频数据加密的二值音频可听密码方案

张选平, 王旭, 邵利平, 赵仲孟 - 西安交通大学学报, 2012 - cqvip.com
数字音频文件数据量大, 相关性强, 冗余度高, 传统加密算法难以满足其实时安全性要求.
针对此问题, 根据人耳听觉特性提出了一种基于二值音频的可听密码方案 …