• No results found

Digital Right Management Model Based on Cryptography for Mobile Multimedia Content

N/A
N/A
Protected

Academic year: 2020

Share "Digital Right Management Model Based on Cryptography for Mobile Multimedia Content"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 2. Structure of a tree
Figure 2: (a) Plain image), (b) Encrypted image by Blowfish algorithm, (c) Encrypted image by Proposed algorithm Table 2: Comparison of decryption time of proposed algorithm with DES algorithm
Fig. 2: (a) Histgram of Plain image,(b) Histogram Encrypted image by Blow fish algorithm,(c) Histogram of Encrypted image by proposed algorithm

References

Related documents

Subgroup analysis for risk factors was not done for early, late, and delayed periods, as the study performed in high risk patients 13 did not provide data for rescue antiemetics

In this study, which included the largest number of patients with DMD/BMD among all similar studies conducted in Ko- rea, slightly different results from previous studies

Social Psychology, Consumer Culture and Neoliberal Political Economy

We investigated the prognostic role of three different RTKs in the survival of the patients who underwent radical cystectomy for muscle invasive UC, and found that FGFR1 was a strong

In this paper, the International Society for Quality of Life Research (ISOQOL) Best Practices for PRO Reporting Taskforce (hereafter ‘ISOQOL Reporting Taskforce’) sought to: 1)

This article does not contest any of these positions but rather adopts a relational realist ontological position (Tilly 2002) to question whether musicians and other key people in

Within this context, we strengthen the current understanding of practice related to graduate employability and employment across the UK HE sector by examining a

Genetic polymorphisms of alcohol dehydrogenase- 1B and aldehyde dehydrogenase-2 and liver cirrhosis, chronic calcific pancreatitis, diabetes mellitus, and hypertension among