Nesreen.A.Otoum, Eran.A.Edirisinghe , " Quantification of Corneal Neovascularization via Contourlet Transform based Segmentation of Blood Vessels " , "Ubiquitous Computing and Communication Journal",Vol.7,No.5, , , 10/01/2011
Nesreen.A.Otoum, Eran.A.Edirisinghe, " Quantification of Corneal Neovascularization via Contourlet Transform based Segmentation of Blood Vessels " , "The 2nd International Conference on Information and Communication",Vol.,No., IEEE Xplore, Irbid, Jordan, 05/02/2011
Nesreen A. Otoum; Eran A. Edirisinghe; Harminder Dua; Lana Faraj, " Evaluating the effectiveness of treatment of corneal ulcers via computer-based automatic image analysis " , "Optics, Photonics, and Digital Technologies for Multimedia Applications II",Vol.,No., SPIE Proceedings Vol. 8436: , Brussels, Belgium , 04/01/2012
Nesreen A. Otoum, E, " A Computer Vision Approach to Quantification of Corneal Neovascularization " , "Imaging and Signal Processing in Healthcare and Technology",Vol.,No., IASTED, Washington, USA, 05/01/2011
Al-Hazaimeh, Obaida M., Alhindawi, Nouh, Otoum, Nesreen A, " A Novel Video Encryption Algorithm-Based On Speaker Voice As The Public Key " , "International Conference on Control Science and Systems Engineering ",Vol.,No., IEEE, Yantai, China, 12/29/2014
Abstract:
Advances in the digital content transmission have been extremely increased in the past few years. In addition, the security and privacy issues of the transmitted data have increasingly an important concern in multimedia technology. In this paper, we propose applicable and secure video encryption algorithm. This makes secure video encryption feasible for real-time application. The proposed algorithm concentrates in general on the symmetric key cryptographic technique. Characteristically, the multimedia technology which has been usually used by public users is resulting in a key exchange problem and normally a trusted intermediate authority takes this responsibility. In this paper, we have proposed a novel video encryption algorithm based on the speaker voice to generate a public key which eliminates the need for a trusted third party for key exchange. The generated public key from the speaker’s voice is used to encrypt of the transferred digital multimedia over the open communication channel (i.e. Internet). The experimental results showed that the proposed algorithm is very secure and has on average only 5.4 ms of encryption time per frame, which is significantly smaller compared to the state of the art secure video encryption algorithms.
|
|