Encryption of MPEG-1 Video Files
There is a modern type of encryption called selective encryption which depends on the choice of some sensitive areas. The encryption of these areas leads to destroy the whole file.
There is a modern type of encryption called selective encryption which depends on the choice of some sensitive areas. The encryption of these areas leads to destroy the whole file.
This research is concerned with the design and implementation of a network security monitoring system. A focus was put on monitoring the shared network resources (specifically filing system). In this work, the layers of TCP/IP suite have been studied and their roles in the process of network monitoring were defined, it was found that the internet layer can play the major role.
With the explosive advancement in imaging technologies and specially with proliferation of the world wide web, image retrieval has attracted the increasing interests of researches in the field of digital libraries, image processing and database system. Research in human perception of image content suggests that content-based image retrieval (CBIR) can follow a sequence of steps. The typical steps of CBIR system are: image query formation, image feature extraction, similarity measurement, indexing and retrieval, and user interaction.