Yearly Archives: 2014

Vol. 69, n° 11-12, November-December 2014
Content available on Springerlink

Smart selective encryption of H.264/AVC videos using confidentiality metrics

L. Dubois1 , W. Puech and J. Blanc-Talon2
(1) University of Montpellier II, France
(2) DGA, Bagneux, France
Abstract In the field of video protection, selective encryption (SE) is a scheme which ensures the visual security of a video by encrypting only a small part of the data. This paper presents a new SE algorithm for H.264/AVC videos in context-adaptive variable-length coding mode. This algorithm controls the amount of encrypted alternative coefficients (ACs) of the integer transform in the entropic encoder.
» Read the summary

Read More

Vol. 69, n° 9-10, September-October 2014
Content available on Springerlink

Compact notch loaded half disk patch antenna for dualband operation

Ashish Singh, Jamshed Aslam Ansari, Kumari Kamakshi, Anurag Mishra and Mohammad Aneesh
University of Allahabad, India

Abstract In this article, microstrip patch antenna loaded with two symmetrical vertical notches and shorting pin is investigated for dualband operation using circuit theory concept based on modal expansion cavity model. It is found that the antenna resonates at 2.84 and 6.33 GHz for upper and lower resonance frequencies respectively. The bandwidth of the compact notch loaded antenna at lower resonance frequency is 9.94 % (theoretical) and 6.67 % (simulated) whereas at upper resonance frequency, it is 12.99 % (theoretical) and 11.59 % (simulated).» Read the summary

Read More

Vol. 69, n° 7-8, July-August 2014
Content available on Springerlink

Guest editors
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Hui Tian, National Huaqiao University, China

Foreword

Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian

3G IP Multimedia Subsystem based framework for lawful interception

Dohoon Kim1, Jungbean Lee1, Young-Gab Kim2, Byungsik Yoon3, and Hoh Peter In1

(1) Korea University, Seoul, Korea
(2) Catholic University of Daegu, Gyeongbuk, Korea
(3) Electronics and Telecommunicating Research Institute (ETRI), Daejeon, Korea

Abstract Issues related to lawful interception, such as invasion of privacy and efficient investigation, are presently at the forefront of social consciousness.» Read the summary

Read More

Vol. 69, n° 5-6, May-June 2014
Content available on Springerlink

Improved method for searching interleavers from a certain set using Garello’s method with applications for the LTE standard

Lucian Trifina, Daniela Tarniceriu
Technical Iniversity Gh. Asachi, Iasi, Romania

Abstract In this paper, we propose a method for searching interleavers within a certain class, with the aim of designing turbo codes with good distance spectrum. The method is based on a modified version of Garello’s algorithm and consists in the calculation of frame error rate truncated upper bound. Here, it is applied to quadratic permutation polynomial (QPP) interleavers able to outperform those chosen for the long-term evolution (LTE) standard, for lengths up to 1,504 bits.» Read the summary

Read More

belief-functions

Vol. 69, n° 3-4, March-April 2014
Content available on Springerlink

Guest editors
Abdelhamid Mellouk, Université Paris-Est Créteil (UPEC), France
Latifa Oukhellou, IFSTTAR, Marne-la-Vallée, France
Lei Shu, Guangdong University of Petrochemical Technology, China
Glenn Shafer, Rutgers Business School, Newark, USA

Foreword

Abdelhamid Mellouk, Latifa Oukhellou, Lei Shu, Glenn Shafer

Belief functions in telecommunications and network technologies: an overview

Mustapha Reda Senouci1, Abdelhamid Mellouk2, Mohamed Abdelkrim Senouci2, Latifa Oukhellou3

(1) Ecole militiaire polytechnique, Algiers, Algeria
(2) Université Paris-Est Créteil (UPEC), France
(3) IFSSTAR, Marne-la-Vallée, France

Abstract In the last few years, evidence theory, also known as Dempster-Shafer theory or belief functions theory, have received growing attention in many fields such as artificial intelligence, computer vision, telecommunications and networks, robotics, and finance.» Read the summary

Read More

Vol. 69, n° 1-2, January-February 2014
Content available on Springerlink

Guest editors
Maryline Laurent, Télécom SudParis, France
Sara Foresti, Università degli Studi di Milano, Italy
Heng Xu, Pennsylviana State University, USA

Foreword

Maryline Laurent, Sara Foresti, Heng Xu

Privacy query rewriting algorithm instrumented by a privacy-aware access control model

Said Oulmakhzoune1, Nora Cuppens-Boulahia1, Frédéric Cuppens1, Stéphane Morucci2, Mahmoud Barhamgi3 and Djamal Benslimane3

(1) Institut Mines-Telecom/Telecom Bretagne, France
(2) SWID, Cesson-Sevigne, France
(3) Lyon 1 University, Villeurbanne, France

Abstract In this paper, we present an approach to instrument a Simple Protocol And RDF Query Language query rewriting algorithm enforcing privacy preferences.» Read the summary

Read More