default search action
International Journal of Multimedia Intelligence and Security, Volume 1
Volume 1, Number 1, 2010
- Ling Guan, Yongjin Wang, Rui Zhang, Tie Yun, Adrian Bulzacki, Muhammad Talal Ibrahim:
Multimodal information fusion for selected multimedia applications. 5-32 - Jing Liu, Changsheng Xu, Hanqing Lu:
Cross-media retrieval: state-of-the-art and open issues. 33-52 - Dimitris N. Kanellopoulos:
Intelligent multimedia engines for multimedia content adaptation. 53-75 - Simone Calderara, Andrea Prati, Rita Cucchiara:
Markerless body part tracking for action recognition. 76-89 - Joon Heo, Eric Y. Chen, Tetsuya Kusumoto, Mitsutaka Itoh:
Source-oriented pattern analysis of flooding-type attacks in SIP-based internet telephony services. 90-115
Volume 1, Number 2, 2010
- Xiaofeng Tong, Wenlong Li, Tao Wang, Yimin Zhang:
Playfield registration in broadcast soccer video. 120-138 - Yu-An Ho, Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining. 139-152 - Cheng Deng, Xinbo Gao, Hao Peng, Lingling An, Feng Ji:
Histogram modification based robust image watermarking approach. 153-168 - G. Sahoo Mesra, Rajesh Kumar Tiwari:
Secure image transmission using steganographic methodologies. 169-190 - Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. 191-203
Volume 1, Number 3, 2010
- Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau, Adel Alti:
UML-profile for multimedia software architectures. 209-231 - Alexander Semenov, Jari Veijalainen, Jorma Kyppö:
Analysing the presence of school-shooting related communities at social media sites. 232-268 - Brian M. Powell, Adam C. Day, Richa Singh, Mayank Vatsa, Afzel Noore:
Image-based face detection CAPTCHA for improved security. 269-284 - Chin-Chen Chang, Chia-Yin Lee, Chang-Chu Chen, Zhi-Hui Wang:
A data-hiding scheme based on one-way hash function. 285-297 - Asim Abdallah Elshiekh, P. D. D. Dominic:
Performance comparison between the key representation database and the original database. 298-316
Volume 1, Number 4, 2010
- Christos K. Volos, Ioannis M. Kyprianidis, Ioannis N. Stouboulos:
Fingerprint images encryption process based on a chaotic true random bits generator. 320-335 - Nagaraj V. Dharwadkar, B. B. Amberker:
An improved reversible steganography scheme based on dual cover images. 336-349 - V. Vijayaraghavan, Sagar Prakash Joglekar, Rajarathnam Nallusamy, Sanjoy Kumar Paul:
Transcoding resistant robust watermarking technique using entropy-based selective spread spectrum. 350-362 - Nikolaos G. Bardis, Nikolaos Doukas, Oleksandr P. Markovskyi:
Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. 363-377 - Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. 378-391 - M. Sivabalakrishnan, D. Manjula:
Adaptive background subtraction using fuzzy logic. 392-401 - Priti Desai, Mark Stamp:
A highly metamorphic virus generator. 402-427 - Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. 428-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.