Search Results - (( developing frames encryption algorithm ) OR ( java visualization search algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This web based approach will be using Java programming language and Mongo DB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality measure for better decision making. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
    Article
  6. 6