
International Journal of Multimedia Intelligence and Security
2013 Vol.3 No.1
Pages | Title and author(s) |
1-22 | Line covering method and its applications in steganography and steganalysisJiajun Mao; Zhenyong Chen; Wei Fan; Zhang Xiong DOI: 10.1504/IJMIS.2013.056465 |
23-50 | Performance analysis of secured video transmission over 3G networks based on H.264/AVCVaralakshmi Kumar; Gnanou Florence Sudha; Ilamparuthi Paruthi DOI: 10.1504/IJMIS.2013.056473 |
51-62 | Camera detection through internet of video sensorsTao Gao; Guo Li; Ping Wang; Chengshan Wang DOI: 10.1504/IJMIS.2013.056466 |
63-79 | A semi-fragile lossless digital watermarking based on adaptive threshold for image authenticationZhenyong Chen; Fangjie Fu; Zhuo Wang; Wei Fan; Zhang Xiong DOI: 10.1504/IJMIS.2013.056467 |
80-92 | Efficient password-authenticated key agreement protocol for smart cards based on ECCSheetal Kalra; Sandeep Sood DOI: 10.1504/IJMIS.2013.056472 |
93-107 | Vocabulary hierarchy optimisation based on spatial context and category informationZhiguo Yang; Yuxin Peng; Jianguo Xiao DOI: 10.1504/IJMIS.2013.056470 |