Mamoona Asghar
Mamoona Asghar
Marie Sklodowska-Curie Research Fellow, AIT, Ireland | Assistant Professor, IUB, Pakistan
Verified email at - Homepage
Cited by
Cited by
An Efficient Security System for CABAC bin-strings of H.264/SVC
M Asghar, M Ghanbari
IEEE Transactions on Circuits and Systems for Video Technology 23 (3), 425-437, 2013
Limitation of silicon based computation and future prospects
S Hassan, M Asghar
2010 Second International Conference on Communication Software and Networks …, 2010
Confidentiality of a selectively encrypted H.264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 2014
Multimedia security perspectives in IoT
A Shifa, MN Asghar, M Fleury
2016 Sixth International Conference on Innovative Computing Technology …, 2016
Sufficient encryption based on entropy coding syntax elements of H.264/SVC
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Multimedia Tools and Applications 73 (3), 2014
Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics
A Shifa, MN Asghar, S Noor, N Gohar, M Fleury
Sensors 19 (5), 1228, 2019
Data Driven Approach for Eye Disease Classification with Machine Learning
S Malik, N Kanwal, MN Asghar, MA Sadiq, I Karamat, M Fleury
Applied Sciences 9 (14), 2789, 2019
Joint Crypto-Stego Scheme for Enhanced Image Protection with Nearest-Centroid Clustering
A Shifa, M Sher Afgan, MN Asghar, M Fleury, I Memon, Abdu, S Abdullah, ...
IEEE ACCESS 6, 16189 - 16206, 2018
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications
A Shifa, MB Imtiaz, MN Asghar, M Fleury
Image and Vision Computing 94, 103859, 2020
Transparent Encryption with Scalable Video Communication: Lower-Latency, CABAC-based Schemes
MN Asghar, R Kousar, H Majid, M Fleury
Journal of Visual Communication and Image Representation 45 ( …, 2017
Sufficient encryption with codewords and bin-strings of H.264/SVC
MN Asghar, M Ghanbari, MJ Reed
Proc. IEEE Int. Conf.Trust, Security and Privacy in Computers and …, 2012
Visual Surveillance within the EU General Data Protection Regulation: A Technology Perspective
MN Asghar, N Kanwal, B Lee, M Fleury, M Herbst, Y Qiao
IEEE ACCESS 7 (1), 111709-111726, 2019
SVS -A Secure Scheme for Video Streaming Using SRTP AES and DH
M Asghar, S Sadaf, K Eidi, A Naseem, S Naweed
European Journal of Scientific Research 40 (2), 177-188, 2010
Efficient selective encryption with H.264/SVC CABAC bin-strings
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Proc. of IEEE Int. Conf. on Image Processing (ICIP), Orlando, Florida, USA …, 2012
Interoperable conditional access with video selective encryption for portable devices
MN Asghar, M Fleury, S Makki
Multimedia Tools and Applications 76 (11), pp 13139–13152, 2017
MIKEY for keys management of H. 264 scalable video coded layers
MN Asghar, M Ghanbari
J. King Saud Univ. Comput. Inf. Sci. 24 (2), 107-116, 2012
Cryptographic keys management for H.264/scalable coded video security
M Asghar, M Ghanbari
Cryptographic keys management for H.264/scalable coded video security, 83-86, 2011
Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams
A Shifa, MN Asghar, A Ahmed, M Fleury
Journal of Ambient Intelligence and Humanized Computing, 1-29, 2020
A Survey of Modern Deep Learning based Object Detection Models
SSA Zaidi, MS Ansari, A Aslam, N Kanwal, M Asghar, B Lee
arXiv preprint arXiv:2104.11892, 2021
Effectiveness of Crypto-Transcoding for H.264/AVC and HEVC Video Bit-streams
RA Shah, MN Asghar, S Abdullah, M Fleury, N Gohar
Multimedia Tools and Applications 2019, 30, 2019
The system can't perform the operation now. Try again later.
Articles 1–20