Author of the publication

Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks.

, , , , , and . IEEE Trans. Multimedia, 12 (3): 215-223 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive approach for image encryption and secure transmission over multirate wireless sensor networks., , , and . Wireless Communications and Mobile Computing, 9 (3): 383-393 (2009)Matching Stream Authentication and Resource Allocation to Multimedia Codec Dependency with Position-Value Partitioning in Wireless Multimedia Sensor Networks., , , , and . GLOBECOM, page 1-5. IEEE, (2009)Position Based Unequal Error Protection for Image Transmission with Energy Constraint over Multirate XPD MIMO Sensor Networks., , , , , and . GLOBECOM, page 4730-4734. IEEE, (2008)Component-based Multirate Image Transmission over Wireless Sensor Networks., , , and . PIMRC, page 1-5. IEEE, (2007)A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks., , , , , and . PIMRC, page 1620-1624. IEEE, (2010)Hierarchical Character Oriented Wildlife Species Recognition Through Heterogeneous Wireless Sensor Networks., , , , and . PIMRC, page 1-5. IEEE, (2007)Cross-layer multirate interaction with Distributed Source Coding in Wireless Sensor Networks., , , , and . IEEE Trans. Wireless Communications, 8 (2): 787-795 (2009)Performance Analysis of a Novel Low-Complexity High-Precision Timing Synchronization Method for Wireless Sensor Networks., , , , and . IEEE Trans. Wireless Communications, 13 (9): 4758-4765 (2014)Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms., , , , and . ICIP, page 297-300. IEEE, (2011)Real-time audio steganography attack based on automatic objective quality feedback., , , and . Security and Communication Networks, 9 (8): 737-746 (2016)