Sample articles
You can read all of these full-text articles free of charge - click
International Journal of Multimedia Intelligence and Security
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
Vocabulary hierarchy optimisation based on spatial context and category information | Zhiguo Yang; Yuxin Peng; Jianguo Xiao | Vol.3 No.1 | 93-107 | |
Efficient password-authenticated key agreement protocol for smart cards based on ECC | Sheetal Kalra; Sandeep Sood | Vol.3 No.1 | 80-92 | |
A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication | Zhenyong Chen; Fangjie Fu; Zhuo Wang; Wei Fan; Zhang Xiong | Vol.3 No.1 | 63-79 | |
Camera detection through internet of video sensors | Tao Gao; Guo Li; Ping Wang; Chengshan Wang | Vol.3 No.1 | 51-62 | |
Performance analysis of secured video transmission over 3G networks based on H.264/AVC | Varalakshmi Kumar; Gnanou Florence Sudha; Ilamparuthi Paruthi | Vol.3 No.1 | 23-50 | |
Line covering method and its applications in steganography and steganalysis | Jiajun Mao; Zhenyong Chen; Wei Fan; Zhang Xiong | Vol.3 No.1 | 1-22 |