Search dblp for Publications

export results for "stream:streams/journals/ijmis:"

 download as .bib file

@article{DBLP:journals/ijmis/BoudhirOAEB20,
  author    = {Anouar Abdelhakim Boudhir and
               Ikram Ben Abdel Ouahab and
               Mohamed Ben Ahmed and
               Lotfi Elaachak and
               Mohammed Bouhorma},
  title     = {New generic approach based on cross compilation for securing IoT communications},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {383--392},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114781},
  doi       = {10.1504/IJMIS.2020.114781},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/BoudhirOAEB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/BouhaferHHA20,
  author    = {Fadwa Bouhafer and
               Anass El Haddadi and
               Mohammed Heyouni and
               Ouafaa Ben Ali},
  title     = {{XEW} 2.0: big data analytics tool based on swarm intelligence},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {348--370},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114776},
  doi       = {10.1504/IJMIS.2020.114776},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/BouhaferHHA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ElghomaryBD20,
  author    = {Khadija Elghomary and
               Driss Bouzidi and
               Najima Daoudi},
  title     = {Study and review of {OSN} and SIoT trust models: towards a dynamic
               {MOOC} trust model},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {407--431},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114796},
  doi       = {10.1504/IJMIS.2020.114796},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ElghomaryBD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GounniRA20,
  author    = {Ali Gounni and
               Noureddine Rais and
               Mostafa Idrissi Azzouzi},
  title     = {Implementation of liquefied natural gas as an alternative fuel technology
               using stochastic traffic: a case study for Morocco},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {321--336},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114774},
  doi       = {10.1504/IJMIS.2020.114774},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GounniRA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MoudenJH20,
  author    = {Zakariyaa Ait El Mouden and
               Abdeslam Jakimi and
               Moha Hajar},
  title     = {Unsupervised graph clustering for community detection in complex networks
               using spectral analysis},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {337--347},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114775},
  doi       = {10.1504/IJMIS.2020.114775},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MoudenJH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MzibriMG20,
  author    = {Marouane Mzibri and
               Abdelilah Maach and
               Driss El Ghanami},
  title     = {A supervised learning approach to estimating the urban traffic state
               based on floating car data},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {393--406},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114795},
  doi       = {10.1504/IJMIS.2020.114795},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MzibriMG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ZahhafiK20,
  author    = {Leila Zahhafi and
               Omar Khadir},
  title     = {An anonymous electronic voting scheme for multiple elections using
               a variant of the ElGamal digital signature},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {4},
  pages     = {371--382},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJMIS.2020.114777},
  doi       = {10.1504/IJMIS.2020.114777},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ZahhafiK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/HamrounLNA19,
  author    = {Mohamed Hamroun and
               Sonia Lajmi and
               Henri Nicolas and
               Ikram Amous},
  title     = {A new method of combining colour, texture and shape features using
               the genetic algorithm for image retrieval},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {3},
  pages     = {293--319},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJMIS.2019.104798},
  doi       = {10.1504/IJMIS.2019.104798},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/HamrounLNA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MaharmehAHI19,
  author    = {Hamza Al Maharmeh and
               Mohammad Alhawari and
               Chung{-}Chih Hung and
               Mohammed Ismail},
  title     = {Hardware security threats and countermeasures: a study of obfuscation,
               camouflaging and PUFs},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {3},
  pages     = {271--292},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJMIS.2019.104796},
  doi       = {10.1504/IJMIS.2019.104796},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MaharmehAHI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/PatelD19,
  author    = {Dhwani Patel and
               Manik Lal Das},
  title     = {{TIDE:} tampered image detection using mutual information},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {3},
  pages     = {205--220},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJMIS.2019.104785},
  doi       = {10.1504/IJMIS.2019.104785},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/PatelD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/SohelFRNSR19,
  author    = {Md. Sadiqur Rahman Sohel and
               Chowdhury Nawrin Ferdous and
               Ashikur Rahman and
               Akib Jawad Nafis and
               Salsabil Arabi Shushmi and
               Raqeebir Rab},
  title     = {On constructing contention aware connected dominating sets for inter-connectivity
               among internet of things devices},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {3},
  pages     = {244--270},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJMIS.2019.104795},
  doi       = {10.1504/IJMIS.2019.104795},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/SohelFRNSR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/VeraSDD19,
  author    = {Ra{\'{u}}l Vera and
               Amina F. Shehu and
               Tooska Dargahi and
               Ali Dehghantanha},
  title     = {Cyber defence triage for multimedia data intelligence: Hellsing, Desert
               Falcons and Lotus Blossom {APT} campaigns as case studies},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {3},
  pages     = {221--243},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJMIS.2019.104786},
  doi       = {10.1504/IJMIS.2019.104786},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/VeraSDD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GaoWZG18,
  author    = {Yun Gao and
               Xin Wei and
               Liang Zhou and
               Mohsen Guizani},
  title     = {QoE in multimedia domain: a user-centric quality assessment},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {162--186},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJMIS.2018.096403},
  doi       = {10.1504/IJMIS.2018.096403},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GaoWZG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KumarCS18,
  author    = {Rajeev Kumar and
               Satish Chand and
               Samayveer Singh},
  title     = {A reversible high capacity data hiding scheme using combinatorial
               strategy},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {146--161},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJMIS.2018.096356},
  doi       = {10.1504/IJMIS.2018.096356},
  timestamp = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmis/KumarCS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KumarN18,
  author    = {Jalesh Kumar and
               Shivananda Nirmala},
  title     = {A novel approach for enhancing the security of information content
               of an image},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {109--128},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJMIS.2018.096354},
  doi       = {10.1504/IJMIS.2018.096354},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/KumarN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ViswanathanK18,
  author    = {P. Viswanathan and
               P. Venkata Krishna},
  title     = {Region-based colour image spatial fusion steganographic system},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {129--145},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJMIS.2018.096355},
  doi       = {10.1504/IJMIS.2018.096355},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ViswanathanK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ZhaoH18,
  author    = {Shushan Zhao and
               Wenhui Hu},
  title     = {Improvement on {OTP} authentication and a possession-based authentication
               framework},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {187--203},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJMIS.2018.096406},
  doi       = {10.1504/IJMIS.2018.096406},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ZhaoH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ChenFWFX13,
  author    = {Zhenyong Chen and
               Fangjie Fu and
               Zhuo Wang and
               Wei Fan and
               Zhang Xiong},
  title     = {A semi-fragile lossless digital watermarking based on adaptive threshold
               for image authentication},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {63--79},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056467},
  doi       = {10.1504/IJMIS.2013.056467},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ChenFWFX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GaoLWW13,
  author    = {Tao Gao and
               Guo Li and
               Ping Wang and
               Chengshan Wang},
  title     = {Camera detection through internet of video sensors},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {51--62},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056466},
  doi       = {10.1504/IJMIS.2013.056466},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GaoLWW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KalraS13,
  author    = {Sheetal Kalra and
               Sandeep K. Sood},
  title     = {Efficient password-authenticated key agreement protocol for smart
               cards based on {ECC}},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {80--92},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056472},
  doi       = {10.1504/IJMIS.2013.056472},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/KalraS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KumarSP13,
  author    = {Varalakshmi Kumar and
               Gnanou Florence Sudha and
               Ilamparuthi Paruthi},
  title     = {Performance analysis of secured video transmission over 3G networks
               based on {H.264/AVC}},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {23--50},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056473},
  doi       = {10.1504/IJMIS.2013.056473},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/KumarSP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MaoCFX13,
  author    = {Jiajun Mao and
               Zhenyong Chen and
               Wei Fan and
               Zhang Xiong},
  title     = {Line covering method and its applications in steganography and steganalysis},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {1--22},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056465},
  doi       = {10.1504/IJMIS.2013.056465},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MaoCFX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/YangPX13,
  author    = {Zhiguo Yang and
               Yuxin Peng and
               Jianguo Xiao},
  title     = {Vocabulary hierarchy optimisation based on spatial context and category
               information},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {93--107},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJMIS.2013.056470},
  doi       = {10.1504/IJMIS.2013.056470},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/YangPX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/AzadRR11,
  author    = {D. Azad and
               H. S. Rekha and
               K. Ramji},
  title     = {An effective {IP} algorithm for active {IR} thermographs: detecting
               defects metallic stuffs},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {296--319},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044730},
  doi       = {10.1504/IJMIS.2011.044730},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/AzadRR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/DarasADTBJVCSMCMMSS11,
  author    = {Petros Daras and
               Apostolos Axenopoulos and
               Vasilios Darlagiannis and
               Dimitrios Tzovaras and
               Xavier Le Bourdon and
               Laurent Joyeux and
               Anne Verroust{-}Blondet and
               Vincenzo Croce and
               Thomas Steiner and
               Alberto Massari and
               Antonio Camurri and
               Steeve Morin and
               Amar{-}Djalil Mezaour and
               Lorenzo Sutton and
               Sabine Spiller},
  title     = {Introducing a unified framework for content object description},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {351--375},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044765},
  doi       = {10.1504/IJMIS.2011.044765},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/DarasADTBJVCSMCMMSS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/FarzanehM11,
  author    = {Mandana Farzaneh and
               Shahriar Mohammadi},
  title     = {Role of common website features on providing a secure news website:
               an empirical approach},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {320--338},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044731},
  doi       = {10.1504/IJMIS.2011.044731},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/FarzanehM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GhareebV11,
  author    = {Majd Ghareeb and
               C{\'{e}}sar Viho},
  title     = {A QoE-based approach for multiple description coding {(MDC)} streaming
               over video distribution network {(VDN)}},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {202--224},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044761},
  doi       = {10.1504/IJMIS.2011.044761},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GhareebV11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GopalanM11,
  author    = {Chitrakala Gopalan and
               D. Manjula},
  title     = {Text binarisation for complex multi coloured textual images},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {90--104},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040931},
  doi       = {10.1504/IJMIS.2011.040931},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GopalanM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/HisadaHTM11,
  author    = {Takayuki Hisada and
               Yusuke Hirota and
               Hideki Tode and
               Koso Murakami},
  title     = {{P2P} network system for private live-streaming distribution},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {36--53},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040928},
  doi       = {10.1504/IJMIS.2011.040928},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/HisadaHTM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/JalalS11,
  author    = {Anand Singh Jalal and
               Vrijendra Singh},
  title     = {Robust object tracking under appearance change conditions based on
               Daubechies complex wavelet transform},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {252--268},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044728},
  doi       = {10.1504/IJMIS.2011.044728},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/JalalS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KawanoHS11,
  author    = {Yasuhiro Kawano and
               Koji Hashimoto and
               Yoshitaka Shibata},
  title     = {A relay path selection method for video streaming on shared terminals},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {18--35},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040927},
  doi       = {10.1504/IJMIS.2011.040927},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/KawanoHS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LiuL11,
  author    = {Guangjie Liu and
               Weiwei Liu},
  title     = {An adaptive matrix embedding based on {LSB} matching for grey-scale
               images},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {238--251},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044763},
  doi       = {10.1504/IJMIS.2011.044763},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/LiuL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LooXMYS11,
  author    = {Jonathan Loo and
               Zhuo Xue and
               Enrico Masala and
               Amanda Yip and
               Dhananjay Singh},
  title     = {Distributed multiview video coding with 3D-DCT transform domain Wyner-Ziv
               codec},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {54--74},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040929},
  doi       = {10.1504/IJMIS.2011.040929},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/LooXMYS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LuHLL11,
  author    = {Jicang Lu and
               Yongfeng Huang and
               Fenlin Liu and
               Xiangyang Luo},
  title     = {Pulse position checking-based steganalysis of {G.723.1} compressed
               speech in VoIP},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {225--237},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044762},
  doi       = {10.1504/IJMIS.2011.044762},
  timestamp = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmis/LuHLL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/NianL11,
  author    = {Gui{-}jun Nian and
               Hongshi Liu},
  title     = {Data hiding in colour image applied in certificate verification},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {186--198},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.041365},
  doi       = {10.1504/IJMIS.2011.041365},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/NianL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/PomponiuC11,
  author    = {Victor Pomponiu and
               Davide Cavagnino},
  title     = {Security analysis of SVD-based watermarking techniques},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {120--145},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.041362},
  doi       = {10.1504/IJMIS.2011.041362},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/PomponiuC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/RahamanRT11,
  author    = {Mohammad Saiedur Rahaman and
               Ashfaqur Rahman and
               Sumaira Tasnim},
  title     = {An adaptive harmonic broadcasting scheme with download and playback
               synchronisation for video on demand},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {4--17},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040926},
  doi       = {10.1504/IJMIS.2011.040926},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/RahamanRT11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/RajendranS11,
  author    = {Priya Rajendran and
               T. N. Shanmugam},
  title     = {A content-based video retrieval system: video retrieval with extensive
               features},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {146--171},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.041363},
  doi       = {10.1504/IJMIS.2011.041363},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/RajendranS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/RaouyaneMMM11,
  author    = {Raouyane Brahim and
               Mostafa Bellafkih and
               Mohamed Errais and
               Mohamed Ramdani},
  title     = {{IMS} management and monitoring with eTOM framework and composite
               web service},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {172--185},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.041364},
  doi       = {10.1504/IJMIS.2011.041364},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/RaouyaneMMM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/SaravanakumarVA11,
  author    = {S. Saravanakumar and
               A. Vadivel and
               C. G. Saneem Ahmed},
  title     = {Object tracking in video by egg shape boundary model and properties
               of {HSV} colour space},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {269--295},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044729},
  doi       = {10.1504/IJMIS.2011.044729},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/SaravanakumarVA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ShuHNCH11,
  author    = {Lei Shu and
               Takahiro Hara and
               Shojiro Nishio and
               Yuanfang Chen and
               Manfred Hauswirth},
  title     = {The new challenge: mobile multimedia sensor networks},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {107--119},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.041361},
  doi       = {10.1504/IJMIS.2011.041361},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ShuHNCH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/Sood11,
  author    = {Sandeep K. Sood},
  title     = {An improved and secure smart card-based authentication scheme},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {75--89},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.040930},
  doi       = {10.1504/IJMIS.2011.040930},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/Sood11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ZhengLYZL11,
  author    = {Dongning Zheng and
               Fenlin Liu and
               Chunfang Yang and
               Qian Zhang and
               Xiangyang Luo},
  title     = {Identification of steganography software based on register dependence},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {2},
  number    = {3/4},
  pages     = {339--350},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044764},
  doi       = {10.1504/IJMIS.2011.044764},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ZhengLYZL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/BardisDM10,
  author    = {Nikolaos G. Bardis and
               Nikolaos Doukas and
               Oleksandr P. Markovskyi},
  title     = {Fast subscriber identification based on the zero knowledge principle
               for multimedia content distribution},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {363--377},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039237},
  doi       = {10.1504/IJMIS.2010.039237},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/BardisDM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/CalderaraPC10,
  author    = {Simone Calderara and
               Andrea Prati and
               Rita Cucchiara},
  title     = {Markerless body part tracking for action recognition},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {76--89},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.035972},
  doi       = {10.1504/IJMIS.2010.035972},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/CalderaraPC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ChangLCW10,
  author    = {Chin{-}Chen Chang and
               Chia{-}Yin Lee and
               Chang{-}Chu Chen and
               Zhi{-}Hui Wang},
  title     = {A data-hiding scheme based on one-way hash function},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {285--297},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.037542},
  doi       = {10.1504/IJMIS.2010.037542},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ChangLCW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/DengGPAJ10,
  author    = {Cheng Deng and
               Xinbo Gao and
               Hao Peng and
               Lingling An and
               Feng Ji},
  title     = {Histogram modification based robust image watermarking approach},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {153--168},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.036073},
  doi       = {10.1504/IJMIS.2010.036073},
  timestamp = {Fri, 16 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/DengGPAJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/DesaiS10,
  author    = {Priti Desai and
               Mark Stamp},
  title     = {A highly metamorphic virus generator},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {402--427},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039240},
  doi       = {10.1504/IJMIS.2010.039240},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/DesaiS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/DharwadkarA10,
  author    = {Nagaraj V. Dharwadkar and
               B. B. Amberker},
  title     = {An improved reversible steganography scheme based on dual cover images},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {336--349},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039235},
  doi       = {10.1504/IJMIS.2010.039235},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/DharwadkarA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ElshiekhD10,
  author    = {Asim Abdallah Elshiekh and
               P. D. D. Dominic},
  title     = {Performance comparison between the key representation database and
               the original database},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {298--316},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.037543},
  doi       = {10.1504/IJMIS.2010.037543},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/ElshiekhD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GuanWZTBI10,
  author    = {Ling Guan and
               Yongjin Wang and
               Rui Zhang and
               Tie Yun and
               Adrian Bulzacki and
               Muhammad Talal Ibrahim},
  title     = {Multimodal information fusion for selected multimedia applications},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {5--32},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.035969},
  doi       = {10.1504/IJMIS.2010.035969},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GuanWZTBI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/GuptaJM10,
  author    = {Brij B. Gupta and
               Ramesh C. Joshi and
               Manoj Misra},
  title     = {Estimating strength of DDoS attack using various regression models},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {378--391},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039238},
  doi       = {10.1504/IJMIS.2010.039238},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/GuptaJM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/HeoCKI10,
  author    = {Joon Heo and
               Eric Y. Chen and
               Tetsuya Kusumoto and
               Mitsutaka Itoh},
  title     = {Source-oriented pattern analysis of flooding-type attacks in SIP-based
               internet telephony services},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {90--115},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.035973},
  doi       = {10.1504/IJMIS.2010.035973},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/HeoCKI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/HoFLC10,
  author    = {Yu{-}An Ho and
               Jen{-}Bang Feng and
               Iuon{-}Chang Lin and
               Yen{-}Ping Chu},
  title     = {A least-significant-bit substitution data hiding scheme by using modulus
               function and optimal permutation refining},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {139--152},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.036072},
  doi       = {10.1504/IJMIS.2010.036072},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/HoFLC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/Kanellopoulos10,
  author    = {Dimitris N. Kanellopoulos},
  title     = {Intelligent multimedia engines for multimedia content adaptation},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {53--75},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.035971},
  doi       = {10.1504/IJMIS.2010.035971},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/Kanellopoulos10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/KifayatMS10,
  author    = {Kashif Kifayat and
               Madjid Merabti and
               Qi Shi},
  title     = {Future security challenges in cloud computing},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {428--442},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039241},
  doi       = {10.1504/IJMIS.2010.039241},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/KifayatMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LiuXL10,
  author    = {Jing Liu and
               Changsheng Xu and
               Hanqing Lu},
  title     = {Cross-media retrieval: state-of-the-art and open issues},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {33--52},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.035970},
  doi       = {10.1504/IJMIS.2010.035970},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/LiuXL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MakhloufZRDA10,
  author    = {Derdour Makhlouf and
               Nacira Ghoualmi{-}Zine and
               Philippe Roose and
               Marc Dalmau and
               Adel Alti},
  title     = {UML-profile for multimedia software architectures},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {209--231},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.037539},
  doi       = {10.1504/IJMIS.2010.037539},
  timestamp = {Thu, 20 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MakhloufZRDA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/MesraT10,
  author    = {G. Sahoo Mesra and
               Rajesh Kumar Tiwari},
  title     = {Secure image transmission using steganographic methodologies},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {169--190},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.036074},
  doi       = {10.1504/IJMIS.2010.036074},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/MesraT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/PowellDSVN10,
  author    = {Brian M. Powell and
               Adam C. Day and
               Richa Singh and
               Mayank Vatsa and
               Afzel Noore},
  title     = {Image-based face detection {CAPTCHA} for improved security},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {269--284},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.037541},
  doi       = {10.1504/IJMIS.2010.037541},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/PowellDSVN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/QianZFR10,
  author    = {Zhenxing Qian and
               Xinpeng Zhang and
               Guorui Feng and
               Yanli Ren},
  title     = {Colour filter array interpolation based self recovery with anti-cropping
               capability},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {191--203},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.036075},
  doi       = {10.1504/IJMIS.2010.036075},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmis/QianZFR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/SemenovVK10,
  author    = {Alexander Semenov and
               Jari Veijalainen and
               Jorma Kypp{\"{o}}},
  title     = {Analysing the presence of school-shooting related communities at social
               media sites},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {232--268},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.037540},
  doi       = {10.1504/IJMIS.2010.037540},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/SemenovVK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/SivabalakrishnanM10,
  author    = {M. Sivabalakrishnan and
               D. Manjula},
  title     = {Adaptive background subtraction using fuzzy logic},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {392--401},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039239},
  doi       = {10.1504/IJMIS.2010.039239},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/SivabalakrishnanM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/TongLWZ10,
  author    = {Xiaofeng Tong and
               Wenlong Li and
               Tao Wang and
               Yimin Zhang},
  title     = {Playfield registration in broadcast soccer video},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {120--138},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.036071},
  doi       = {10.1504/IJMIS.2010.036071},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmis/TongLWZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/VijayaraghavanJNP10,
  author    = {V. Vijayaraghavan and
               Sagar Prakash Joglekar and
               Rajarathnam Nallusamy and
               Sanjoy Kumar Paul},
  title     = {Transcoding resistant robust watermarking technique using entropy-based
               selective spread spectrum},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {350--362},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039236},
  doi       = {10.1504/IJMIS.2010.039236},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijmis/VijayaraghavanJNP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/VolosKS10,
  author    = {Christos K. Volos and
               Ioannis M. Kyprianidis and
               Ioannis N. Stouboulos},
  title     = {Fingerprint images encryption process based on a chaotic true random
               bits generator},
  journal   = {Int. J. Multim. Intell. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {320--335},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJMIS.2010.039234},
  doi       = {10.1504/IJMIS.2010.039234},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/VolosKS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics