Subjects -> PHOTOGRAPHY (Total: 19 journals)
Showing 1 - 10 of 10 Journals sorted by number of followers
ISPRS Journal of Photogrammetry and Remote Sensing     Hybrid Journal   (Followers: 83)
History of Photography     Hybrid Journal   (Followers: 36)
Photography and Culture     Hybrid Journal   (Followers: 24)
British Journal of Photography     Full-text available via subscription   (Followers: 24)
Photographies     Hybrid Journal   (Followers: 12)
ISPRS Open Journal of Photogrammetry and Remote Sensing     Open Access   (Followers: 12)
The Photogrammetric Record     Hybrid Journal   (Followers: 10)
International Journal of Multimedia Intelligence and Security     Hybrid Journal   (Followers: 10)
Philosophy of Photography     Hybrid Journal   (Followers: 10)
Trans-Asia Photography Review     Free   (Followers: 8)
Peritia     Full-text available via subscription   (Followers: 6)
Fotocinema : Revista Científica de Cine y Fotografía     Open Access   (Followers: 5)
Getty Research Journal     Full-text available via subscription   (Followers: 4)
Imaging Science Journal     Hybrid Journal   (Followers: 2)
Color Research & Application     Hybrid Journal   (Followers: 1)
Ciel variable : Art, photo, médias, culture     Full-text available via subscription  
Rivista di studi di fotografia. Journal of Studies in Photography     Open Access  
Similar Journals
Journal Cover
International Journal of Multimedia Intelligence and Security
Number of Followers: 10  
 
Hybrid Journal Hybrid journal   * Containing 1 Open Access Open Access article(s) in this issue *
ISSN (Print) 2042-3462 - ISSN (Online) 2042-3470
Published by Inderscience Publishers Homepage  [439 journals]
  • Privacy-preserving data deduplication in edge-assisted mobile
           crowdsensing

    • Free pre-print version: Loading...

      Authors: Yili Jiang, Kuan Zhang, Yi Qian, Rose Qingyang Hu
      Pages: 1 - 19
      Abstract: Mobile crowdsensing enables the collaborative data collection between mobile workers and centralised cloud server. When sensing data from the surrounding environment, workers in the same location may generate the identical data report. Although edge intelligence is integrated to remove the redundant data by comparing the report content, disclosing the sensing data to the edge nodes results in severe privacy leakage. To detect and remove duplicated data without revealing the content, encryption-based data deduplication schemes are the main solutions. However, the existing schemes have high computational cost due to heavy cryptographic primitives. In this work, we propose a pairing-based data deduplication scheme with lower computational cost. The proposed scheme guarantees both secure data deduplication and secure contributor identification. In addition, by deploying proxy re-encryption, the privacy of task location is preserved. The experimental results demonstrate that the proposed scheme achieves better computational efficiency than the other schemes.
      Keywords: privacy preservation; data deduplication; edge intelligence; computational efficiency; mobile crowdsensing; MCS
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1 (2022) pp. 1 - 19
      PubDate: 2022-03-03T23:20:50-05:00
      DOI: 10.1504/IJMIS.2022.121283
      Issue No: Vol. 4, No. 1 (2022)
       
  • Multimedia security and privacy protection in the internet of things:
           research developments and challenges

         This is an Open Access Article Open Access Article

    • Free pre-print version: Loading...

      Authors: Wencheng Yang, Song Wang, Jiankun HuHu, Nickson M. Karie
      Pages: 20 - 46
      Abstract: With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are being generated from and/or exchanged through various IoT devices, systems and applications. The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. First, we classify multimedia data into different types and security levels according to application areas. Then, we analyse and discuss the existing multimedia data protection schemes in the IoT, including traditional techniques (e.g., cryptography and watermarking) and emerging technologies (e.g., blockchain and federated learning). Based on the detailed analysis on the research development of IoT-related multimedia security and privacy protection, we point out some open challenges and provide future research directions, aiming to advance the study in the relevant fields and assist researchers in gaining a deeper understanding of the state of the art on multimedia data protection in the IoT.
      Keywords: security and privacy; internet of things; IoT; multimedia; federated learning; encryption; watermarking; blockchain
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1 (2022) pp. 20 - 46
      PubDate: 2022-03-03T23:20:50-05:00
      DOI: 10.1504/IJMIS.2022.121282
      Issue No: Vol. 4, No. 1 (2022)
       
  • An efficient three-dimensional prediction structure for coding light field
           video content using the MV-HEVC standard

    • Free pre-print version: Loading...

      Authors: Joseph Khoury, Nusrat Mehajabin, Mahsa T. Pourazad, Panos Nasiopoulos, Victor C.M. Leung
      Pages: 47 - 64
      Abstract: Light field cameras have emerged in the consumer market as a technology that captures richer visual information than legacy cameras. While traditional photography captures only a 2D projection of the scene, the light field camera collects light intensity and direction. As a result, this technology opens new opportunities for applications such as remote surgery, autonomous driving, augmented reality, and digital health. However, one of the main problems with this technology is the size of the data captured which significantly increases the consumers' bandwidth requirements. Numerous solutions have been proposed that attempt to compress light field efficiently, but none of them fully evaluate the intricacies found in light field content. This paper proposes a three-dimensional prediction structure for compressing light field video content using the multi-view extension of HEVC (MV-HEVC). The inter-view structure exploits the correlations between the views in two directions and the high degree of resemblance between views around the centre of each frame. Experimental results show a BD-rate gain of 50.89% while subjective tests have shown a BD-rate improvement of 65.83% in mean opinion score over the state-of-the-art method. This means more visually appealing quality at a significantly reduced bitrate, thus facilitating practical implementations of the emerging technology.
      Keywords: HEVC; light field; multi-view video coding; prediction structure
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1 (2022) pp. 47 - 64
      PubDate: 2022-03-03T23:20:50-05:00
      DOI: 10.1504/IJMIS.2022.121281
      Issue No: Vol. 4, No. 1 (2022)
       
  • An entity matching-based image topic verification framework for online
           fact-checking

    • Free pre-print version: Loading...

      Authors: Xichen Zhang, Sajjad Dadkhah, Samaneh Mahdavifar, Rongxing Lu, Ali A. Ghorbani
      Pages: 65 - 85
      Abstract: The last decade has witnessed an unprecedented growth in online multimedia data. However, the manipulated and fake images have created fertile grounds for sowing online fake news. Consequently, online fact-checking has drawn more attention from academia and industry to detect and mitigate online fake news. Nevertheless, most of the online fact-checking task focus on textual content. Although multimedia information like images can provide promising potentials for identifying misinformation, it has not been adequately studied. Besides, traditional information retrieval techniques, e.g., image caption generation, typically lack high-quality training data or their computation costs are very high. Aiming to address the above issues, we proposed an image topic verification framework based on named entity matching. Particularly, the proposed framework can effectively check if a targeted image is related to a specific topic or not. In addition, it can also retrieve helpful contextual background and knowledge about the targeted image. We conduct extensive experiments and analyses. The results validate the effectiveness and practicality of our framework.
      Keywords: image topic verification; fact-checking; named entity matching
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1 (2022) pp. 65 - 85
      PubDate: 2022-03-03T23:20:50-05:00
      DOI: 10.1504/IJMIS.2022.121286
      Issue No: Vol. 4, No. 1 (2022)
       
  • An improved scheme for image scaling, cropping and colour correction in
           encrypted domain

    • Free pre-print version: Loading...

      Authors: Xichen Zhang, Sajjad Dadkhah, Samaneh Mahdavifar, Rongxing Lu, Ali A. Ghorbani
      Pages: 86 - 99
      Abstract: While outsourcing of image storage and processing is an important service provided by cloud computing, ensuring data confidentiality in the cloud is one of the main concerns. Image processing in encrypted domain (or in a privacy-preserving manner), which performs operations over encrypted images, is receiving more and more attention. Having studied state-of-the-art solutions for image scaling, cropping and colour correction, we notice that the solutions are not compatible with each other so that there is no solution supporting all these operations; in addition, they all need extra overhead in image storage. In this work, we propose a scheme that supports image scaling, cropping, and colour correction in encrypted domain with minimum storage overhead. Its compatibility with modified Paillier-based cryptosystem scheme and optimised ElGamal cryptosystem is analysed. Storage performance is compared with existing solutions. Analysis shows storage requirement is drastically reduced while performance otherwise remains unchanged.
      Keywords: image processing; scaling; cropping; colour correction; encrypted domain
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1 (2022) pp. 86 - 99
      PubDate: 2022-03-03T23:20:50-05:00
      DOI: 10.1504/IJMIS.2022.121268
      Issue No: Vol. 4, No. 1 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.214.184.223
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-