Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT) 2015
DOI: 10.1109/c3it.2015.7060168
|View full text |Cite
|
Sign up to set email alerts
|

Architecture and secure implementation for video conferencing technique

Abstract: With rapid development of various multimedia technologies, ample amount of multimedia data are generated and transmitted for different usage incliding commercial, medical, military etc, and if they are not well protected, the data may be accessed by opponents or unauthorized users. Thus, security and privacy protection of the important messages have become important issues, and a number of techniques based on selective, entropy-based and/or complete encryption are developed. In this paper, we consider some exi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Many papers are focused on these aspects. Mishra et al [23] study how cryptographic techniques are used to achieve security protection to videoconferencing. The authors propose a novel, computationally efficient and secure video encryption algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Many papers are focused on these aspects. Mishra et al [23] study how cryptographic techniques are used to achieve security protection to videoconferencing. The authors propose a novel, computationally efficient and secure video encryption algorithm.…”
Section: Related Workmentioning
confidence: 99%