


default search action
International Journal of Multimedia Intelligence and Security, Volume 3
Volume 3, Number 1, 2013
- Jiajun Mao, Zhenyong Chen, Wei Fan, Zhang Xiong:

Line covering method and its applications in steganography and steganalysis. 1-22 - Varalakshmi Kumar, Gnanou Florence Sudha, Ilamparuthi Paruthi:

Performance analysis of secured video transmission over 3G networks based on H.264/AVC. 23-50 - Tao Gao, Guo Li, Ping Wang, Chengshan Wang:

Camera detection through internet of video sensors. 51-62 - Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Zhang Xiong:

A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication. 63-79 - Sheetal Kalra

, Sandeep K. Sood:
Efficient password-authenticated key agreement protocol for smart cards based on ECC. 80-92 - Zhiguo Yang, Yuxin Peng, Jianguo Xiao:

Vocabulary hierarchy optimisation based on spatial context and category information. 93-107
Volume 3, Number 2, 2018
- Jalesh Kumar, Shivananda Nirmala:

A novel approach for enhancing the security of information content of an image. 109-128 - P. Viswanathan, P. Venkata Krishna:

Region-based colour image spatial fusion steganographic system. 129-145 - Rajeev Kumar, Satish Chand, Samayveer Singh:

A reversible high capacity data hiding scheme using combinatorial strategy. 146-161 - Yun Gao, Xin Wei, Liang Zhou, Mohsen Guizani:

QoE in multimedia domain: a user-centric quality assessment. 162-186 - Shushan Zhao, Wenhui Hu:

Improvement on OTP authentication and a possession-based authentication framework. 187-203
Volume 3, Number 3, 2019
- Dhwani Patel, Manik Lal Das:

TIDE: tampered image detection using mutual information. 205-220 - Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha:

Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies. 221-243 - Md. Sadiqur Rahman Sohel, Chowdhury Nawrin Ferdous, Ashikur Rahman, Akib Jawad Nafis, Salsabil Arabi Shushmi, Raqeebir Rab:

On constructing contention aware connected dominating sets for inter-connectivity among internet of things devices. 244-270 - Hamza Al Maharmeh, Mohammad Alhawari, Chung-Chih Hung, Mohammed Ismail:

Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. 271-292 - Mohamed Hamroun

, Sonia Lajmi
, Henri Nicolas
, Ikram Amous
:
A new method of combining colour, texture and shape features using the genetic algorithm for image retrieval. 293-319
Volume 3, Number 4, 2020
- Ali Gounni, Noureddine Rais, Mostafa Idrissi Azzouzi:

Implementation of liquefied natural gas as an alternative fuel technology using stochastic traffic: a case study for Morocco. 321-336 - Zakariyaa Ait El Mouden, Abdeslam Jakimi, Moha Hajar:

Unsupervised graph clustering for community detection in complex networks using spectral analysis. 337-347 - Fadwa Bouhafer, Anass El Haddadi, Mohammed Heyouni, Ouafaa Ben Ali:

XEW 2.0: big data analytics tool based on swarm intelligence. 348-370 - Leila Zahhafi, Omar Khadir:

An anonymous electronic voting scheme for multiple elections using a variant of the ElGamal digital signature. 371-382 - Anouar Abdelhakim Boudhir, Ikram Ben Abdel Ouahab

, Mohamed Ben Ahmed, Lotfi Elaachak, Mohammed Bouhorma:
New generic approach based on cross compilation for securing IoT communications. 383-392 - Marouane Mzibri, Abdelilah Maach, Driss El Ghanami:

A supervised learning approach to estimating the urban traffic state based on floating car data. 393-406 - Khadija Elghomary, Driss Bouzidi, Najima Daoudi:

Study and review of OSN and SIoT trust models: towards a dynamic MOOC trust model. 407-431

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














