Video authentication in HEVC compressed domain / Tew Yiqi
High Efficiency Video Coding (HEVC) is the latest video compression standard finalized in year 2013. While H.264/Advance Video Coding (AVC) is still the mostly deployed video-coding standard, HEVC is gaining ground, especially for storage and transmission of high-resolution videos such as High De...
| Main Author: | Tew, Yiqi |
|---|---|
| Format: | Thesis |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/6730/ http://studentsrepo.um.edu.my/6730/4/yiqi.pdf |
Similar Items
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
Sketch – An investigation into feature extraction in compressed domain / Kazuki Minemura
by: Kazuki , Minemura
Published: (2017)
by: Kazuki , Minemura
Published: (2017)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Patient video compression using 3-D block transforms for telemedicine applications
by: Sriraam, N, et al.
Published: (2006)
by: Sriraam, N, et al.
Published: (2006)
HEVC watermarking techniques for authentication and copyright applications: challenges and opportunities
by: Ali A., Elrowayati, et al.
Published: (2020)
by: Ali A., Elrowayati, et al.
Published: (2020)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
VCVERSE - A Video Conferencing Website with Controls
by: Smitha, D Souza, et al.
Published: (2024)
by: Smitha, D Souza, et al.
Published: (2024)
Construction of zoonosis domain relationship as a preliminary stage for developing a zoonosis emerging system
by: D.R.A., Rambli, et al.
Published: (2008)
by: D.R.A., Rambli, et al.
Published: (2008)
Comparison of domain and hydrophobicity features for the prediction of protein-protein interactions using support vector machines
by: Alashwal, Hany, et al.
Published: (2007)
by: Alashwal, Hany, et al.
Published: (2007)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
TEMPORAL VIDEO COMPRESSION USING MODE FACTOR AND POLYNOMIAL FITTING ON WAVELET COEFFICIENTS
by: Devi, TN, et al.
Published: (2009)
by: Devi, TN, et al.
Published: (2009)
Frame selection based on modified entropy and object motion for secured data hiding in videos
by: Muhammad Fuad, Abdullah
Published: (2021)
by: Muhammad Fuad, Abdullah
Published: (2021)
Development and analysis of spatial domain and transform domain watermarking technique
by: Chua, Kah Keong
Published: (2011)
by: Chua, Kah Keong
Published: (2011)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Two-factor human authentication
by: Liang, Xian Liang
Published: (2018)
by: Liang, Xian Liang
Published: (2018)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Pedestrian Detection and Tracking in Surveillance Video
by: Chong, Penny
Published: (2016)
by: Chong, Penny
Published: (2016)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal
by: Al-Khayyat, Kamal, et al.
Published: (2018)
by: Al-Khayyat, Kamal, et al.
Published: (2018)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Webcam Based Fingerprint Authentication for Personal Identification System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Understanding Domain Expert's Perspectives and Expectations in Assistive Technology
by: Suziah, Sulaiman, et al.
Published: (2010)
by: Suziah, Sulaiman, et al.
Published: (2010)
Affective computing model using source-temporal domain
by: Shams, Wafaa Khazaal, et al.
Published: (2013)
by: Shams, Wafaa Khazaal, et al.
Published: (2013)
Algorithms of Classification of Mass Problems of Production Subject Domains
by: Malakhov, Eugene, et al.
Published: (2019)
by: Malakhov, Eugene, et al.
Published: (2019)
Ontology based keyword suggestion for image processing domain
by: Ooi, Jessie
Published: (2018)
by: Ooi, Jessie
Published: (2018)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Similar Items
-
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020) -
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
by: Muhammad Salihin, Saealal, et al.
Published: (2023) -
Sketch – An investigation into feature extraction in compressed domain / Kazuki Minemura
by: Kazuki , Minemura
Published: (2017) -
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008) -
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)