Skip to main content
Fig. 6 | EURASIP Journal on Image and Video Processing

Fig. 6

From: Integrated visual security management for optimal condition explorations in resource-constrained systems

Fig. 6

a–l Sample frames of original and two encrypted videos by using different encryption techniques in scenario Extended-1. These figures show sample frames (11st, 58th, 132nd, and 256th) of original Foreman video and its encrypted versions using two JVCE schemes P and Q. P and Q differ only in terms of how they protect the temporal information of the video such as the motion vector. P and Q result in visually different encrypted videos. Regarding Table 5 together, Fig. 6 aims to present that the STVSM appropriately captures the difference of the protection on the temporal information in perceptual manner since it considers both the spatial and temporal information as compared to other metrics

Back to article page