


default search action
International Journal of Multimedia Intelligence and Security, Volume 1
Volume 1, Number 1, 2010
- Ling Guan, Yongjin Wang, Rui Zhang, Tie Yun, Adrian Bulzacki, Muhammad Talal Ibrahim:

Multimodal information fusion for selected multimedia applications. 5-32 - Jing Liu, Changsheng Xu, Hanqing Lu:

Cross-media retrieval: state-of-the-art and open issues. 33-52 - Dimitris N. Kanellopoulos:

Intelligent multimedia engines for multimedia content adaptation. 53-75 - Simone Calderara

, Andrea Prati, Rita Cucchiara:
Markerless body part tracking for action recognition. 76-89 - Joon Heo, Eric Y. Chen, Tetsuya Kusumoto, Mitsutaka Itoh:

Source-oriented pattern analysis of flooding-type attacks in SIP-based internet telephony services. 90-115
Volume 1, Number 2, 2010
- Xiaofeng Tong, Wenlong Li, Tao Wang, Yimin Zhang

:
Playfield registration in broadcast soccer video. 120-138 - Yu-An Ho, Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:

A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining. 139-152 - Cheng Deng, Xinbo Gao, Hao Peng, Lingling An, Feng Ji:

Histogram modification based robust image watermarking approach. 153-168 - G. Sahoo Mesra, Rajesh Kumar Tiwari:

Secure image transmission using steganographic methodologies. 169-190 - Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:

Colour filter array interpolation based self recovery with anti-cropping capability. 191-203
Volume 1, Number 3, 2010
- Derdour Makhlouf, Nacira Ghoualmi-Zine, Philippe Roose, Marc Dalmau, Adel Alti:

UML-profile for multimedia software architectures. 209-231 - Alexander Semenov, Jari Veijalainen, Jorma Kyppö:

Analysing the presence of school-shooting related communities at social media sites. 232-268 - Brian M. Powell, Adam C. Day, Richa Singh

, Mayank Vatsa, Afzel Noore:
Image-based face detection CAPTCHA for improved security. 269-284 - Chin-Chen Chang, Chia-Yin Lee, Chang-Chu Chen, Zhi-Hui Wang:

A data-hiding scheme based on one-way hash function. 285-297 - Asim Abdallah Elshiekh, P. D. D. Dominic:

Performance comparison between the key representation database and the original database. 298-316
Volume 1, Number 4, 2010
- Christos K. Volos, Ioannis M. Kyprianidis, Ioannis N. Stouboulos:

Fingerprint images encryption process based on a chaotic true random bits generator. 320-335 - Nagaraj V. Dharwadkar

, B. B. Amberker:
An improved reversible steganography scheme based on dual cover images. 336-349 - V. Vijayaraghavan, Sagar Prakash Joglekar, Rajarathnam Nallusamy, Sanjoy Kumar Paul:

Transcoding resistant robust watermarking technique using entropy-based selective spread spectrum. 350-362 - Nikolaos G. Bardis, Nikolaos Doukas, Oleksandr P. Markovskyi:

Fast subscriber identification based on the zero knowledge principle for multimedia content distribution. 363-377 - Brij B. Gupta

, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. 378-391 - M. Sivabalakrishnan, D. Manjula:

Adaptive background subtraction using fuzzy logic. 392-401 - Priti Desai, Mark Stamp

:
A highly metamorphic virus generator. 402-427 - Kashif Kifayat, Madjid Merabti, Qi Shi

:
Future security challenges in cloud computing. 428-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














