Integrated visual security management for optimal condition explorations in resource-constrained systems
As more and more mobile video applications contain important and private video data, various video encryption techniques have been proposed to protect them. Many of those applications typically utilize the sta...