Online security techniques for processing of video

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We propose two methods to overcome overhead (of computational power and memory) in approaches used for video security: a multiresolution transform with an additional feature of signal hopping and use of synchronized chaos for signals. We compare both approaches and propose some suggestions for various security risk video applications.

Original languageEnglish
Title of host publicationProceeding of the International Conference on Telecommunications
EditorsL. Yuan'an, L. Yuan'an
Pages840-844
Number of pages5
Publication statusPublished - Dec 1 2002
Externally publishedYes
EventProceedings of the International Conference on Telecommunications 2002 - Beijing, China
Duration: Jun 23 2002Jun 26 2002

Publication series

NameProceeding of the International Conference on Telecommunications
Volume1

Other

OtherProceedings of the International Conference on Telecommunications 2002
Country/TerritoryChina
CityBeijing
Period6/23/026/26/02

ASJC Scopus subject areas

  • Media Technology
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Online security techniques for processing of video'. Together they form a unique fingerprint.

Cite this