iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S11042-019-08333-2
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:40:57Z","timestamp":1726000857661},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08333-2","type":"journal-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T08:03:16Z","timestamp":1573545796000},"page":"1801-1819","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Energy-efficient secured data reduction technique using image difference function in wireless video sensor networks"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7553-1987","authenticated-orcid":false,"given":"Christian","family":"Salim","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Makhoul","sequence":"additional","affiliation":[]},{"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,12]]},"reference":[{"issue":"1","key":"8333_CR1","doi-asserted-by":"publisher","first-page":"3145","DOI":"10.3390\/s100403145","volume":"10","author":"M Alaei","year":"2010","unstructured":"Alaei M, Barcelo-Ordinas JM (2010) A method for clustering and cooperation in wireless multimedia sensor networks. Sensors 10(1):3145\u20133169","journal-title":"Sensors"},{"issue":"0","key":"8333_CR2","first-page":"3145","volume":"10","author":"M Alaei","year":"2010","unstructured":"Alaei M, Barcelo-Ordinas JM (2010) A method for clustering and cooperation in wireless multimedia sensor networks. Patent Appl Publication 10(0):3145\u20133169","journal-title":"Patent Appl Publication"},{"issue":"2","key":"8333_CR3","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TIM.2009.2023818","volume":"59","author":"C. Alippi","year":"2010","unstructured":"Alippi C, Anastasi G, Francesco M, Roveri M (2010) An adaptive sampling algorithm for effective energy management in wireless sensor networks with energy-hungry sensors. IEEE TRansactions on Instrumentation and Measurement, 59(2)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"0","key":"8333_CR4","first-page":"153","volume":"11","author":"JM Bahi","year":"2014","unstructured":"Bahi JM, Makhoul A, Medlej M (2014) An optimized in-network aggregation scheme for data collection in periodic sensor networks. ADHOC-NOW 11(0):153\u2013166","journal-title":"ADHOC-NOW"},{"issue":"1\/2","key":"8333_CR5","first-page":"77","volume":"21","author":"JM Bahi","year":"2014","unstructured":"Bahi JM, Makhoul A, Medlej M (2014) A two tiers data aggregation scheme for periodic sensor networks. Ad Hoc and Sensor Wireless Networks 21(1\/2):77\u2013100","journal-title":"Ad Hoc and Sensor Wireless Networks"},{"key":"8333_CR6","doi-asserted-by":"crossref","unstructured":"Benbernou S, Makhoul A, Hacid M-S, Mostefaoui A (2005) A spatio-temporal adaptation model for multimedia presentations. ISM: 143\u2013150","DOI":"10.1109\/ISM.2005.21"},{"issue":"0","key":"8333_CR7","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.procs.2013.09.031","volume":"21","author":"A Benzerbadj","year":"2013","unstructured":"Benzerbadj A, Kechar B (2013) Redundancy and criticality based scheduling in wireless video sensor networks for monitoring critical areas. Procedia Computer Science 21(0):234\u2013241","journal-title":"Procedia Computer Science"},{"issue":"12","key":"8333_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSSC.2007.908716","volume":"42","author":"J Choi","year":"2007","unstructured":"Choi J, Han S-W, Kim S-J, Chang S-IL, Yoon E (2007) A spatial-temporal multiresolution cmos image sensor with adaptive frame rates for tracking the moving objects in region-of-interest and suppressing motion blur. IEEE Journal of Solid-State Circuits 42(12):1\u201312","journal-title":"IEEE Journal of Solid-State Circuits"},{"issue":"1","key":"8333_CR9","first-page":"1","volume":"1","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) Aes - the advanced encryption standard. The Design of Rijndael 1(1):1\u2013238","journal-title":"The Design of Rijndael"},{"issue":"6","key":"8333_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"2006","unstructured":"Diffie W, Hellman M (2006) New directions in cryptography. IEEE Trans Inf Theor 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theor"},{"issue":"4","key":"8333_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"8333_CR12","doi-asserted-by":"crossref","unstructured":"Gong-bin Q, Qing-feng J, Shui-sheng Q (2009) A new image encryption scheme based on des algorithm and Chua\u2019s circuit. In: 2009 IEEE international workshop on imaging systems and techniques, pp 168\u2013172","DOI":"10.1109\/IST.2009.5071626"},{"key":"8333_CR13","first-page":"254","volume-title":"Lecture Notes in Computer Science","author":"Ludger Hemme","year":"2004","unstructured":"Hemme L (2004) A differential fault attack against early rounds of (triple-)des. In: Joye M, Quisquater J-J (eds) Cryptographic hardware and embedded systems - CHES 2004. Springer , Berlin, pp 254\u2013267"},{"key":"8333_CR14","doi-asserted-by":"crossref","unstructured":"Jin X, Wu Y, Li X, Li Y, Zhao G, Guo K (2016) Ppvibe: privacy preserving background extractor via secret sharing in multiple cloud servers. In: 2016 8th international conference on wireless communications signal processing (WCSP), pp 1\u20135","DOI":"10.1109\/WCSP.2016.7752569"},{"key":"8333_CR15","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1007\/978-3-319-27671-7_47","volume-title":"MultiMedia Modeling","author":"Xin Jin","year":"2016","unstructured":"Jin X, Guo K, Song C, Li X, Zhao G, Luo J, Li Y, Chen Y, Liu Y, Wang H (2016) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Tian Q, Sebe N, Qi G-J, Huet B, Hong R, Liu X (eds) MultiMedia modeling. Springer, Cham, pp 562\u2013573"},{"issue":"0","key":"8333_CR16","first-page":"1","volume":"12","author":"W Luo","year":"2012","unstructured":"Luo W, Lu Q, Xiao Q (2012) Distributed collaborative camera actuation scheme based on sensing-region management forwirelessmultimedia sensor networks. Distributed Sensor Networks 12(0):1\u201314","journal-title":"Distributed Sensor Networks"},{"key":"8333_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.adhoc.2015.08.009","volume":"35","author":"A Makhoul","year":"2015","unstructured":"Makhoul A, Harb H, Laiymani D (2015) Residual energy-based adaptive data collection approach for periodic sensor networks. Ad Hoc Netw 35:149\u2013160","journal-title":"Ad Hoc Netw"},{"issue":"1\/2","key":"8333_CR18","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1504\/IJSNET.2015.069872","volume":"18","author":"A Makhoul","year":"2015","unstructured":"Makhoul A, Laiymani D, Harb H, Bahi JM (2015) An adaptive scheme for data collection and aggregation in periodic sensor networks. IJSNet 18(1\/2):62\u201374","journal-title":"IJSNet"},{"issue":"4","key":"8333_CR19","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.adhoc.2010.08.003","volume":"45","author":"A Newell","year":"2011","unstructured":"Newell A, Akkaya K (2011) Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks. Ad Hoc Netw 45 (4):514\u2013527","journal-title":"Ad Hoc Netw"},{"key":"8333_CR20","doi-asserted-by":"crossref","unstructured":"Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia iot devices. Multimed Tools Appl","DOI":"10.1007\/s11042-018-5660-y"},{"issue":"2","key":"8333_CR21","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/j.jnca.2010.10.002","volume":"34","author":"CD Pham","year":"2011","unstructured":"Pham CD, Makhoul A, Saadi R (2011) Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications. J Network and Computer Applications 34(2):783\u2013795","journal-title":"J Network and Computer Applications"},{"key":"8333_CR22","unstructured":"Priyadarshini SBB, Acharya BM, Das DS (2013) Redundant data elimination and optimum camera actuation in wireless multimedia sensor network (wmsn). IJERT 2(6)"},{"issue":"0","key":"8333_CR23","first-page":"1","volume":"2013","author":"Z Qin","year":"2013","unstructured":"Qin Z, Wang L, Ma C, Xu J, Lu B (2013) An overlapping clustering approach for routing in wireless sensor networks. Int J of Distributed Sensor Netw 2013 (0):1\u201311","journal-title":"Int J of Distributed Sensor Netw"},{"key":"8333_CR24","doi-asserted-by":"crossref","unstructured":"Salim C, Makhoul A, Darazi R, Couturier R (2016) Combining frame rate adaptation and similarity detection for video sensor nodes in wireless multimedia sensor networks. IWCMC: 327\u2013332","DOI":"10.1109\/IWCMC.2016.7577079"},{"issue":"0","key":"8333_CR25","first-page":"1","volume":"15","author":"P Sarisaray-Boluk","year":"2015","unstructured":"Sarisaray-Boluk P, Akkaya K (2015) Performance comparison of data reduction techniques for wireless multimedia sensor network applications. Hindawi Publishing Corporation 15(0):1\u201315","journal-title":"Hindawi Publishing Corporation"},{"issue":"0","key":"8333_CR26","first-page":"234","volume":"21","author":"R Stewart","year":"2003","unstructured":"Stewart R, Trahan K, Chesavage D, Casey S, Rome M, Kokinakes C (2003) Surveillance system and method with adaptive frame rate. Patent Application Publication 21(0):234\u2013241","journal-title":"Patent Application Publication"},{"issue":"8","key":"8333_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCOMM.2005.852834","volume":"53","author":"Y Yao","year":"2005","unstructured":"Yao Y, Giannakis G B (2005) Energy-efficient scheduling for wireless sensor networks. IEEE Trans Commun 53(8):1\u201310","journal-title":"IEEE Trans Commun"},{"key":"8333_CR28","first-page":"01","volume":"21","author":"M Zeghid","year":"2008","unstructured":"Zeghid M, Machhout M, Khriji L, Baganne A, Tourki R (2008) A modified aes based algorithm for image encryption. Int J Adv Trends Comput Sci Eng 21:01","journal-title":"Int J Adv Trends Comput Sci Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08333-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08333-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08333-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:40:48Z","timestamp":1605055248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08333-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":28,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8333"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08333-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"28 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}