References
[1]. D.Kesavaraja, R.Balasubramanian and D.Sasireka,
(2010). “Implementation of a Cloud Data Server (CDS) for
Providing Secure Service in E-Business”, International
Journal of Database Management Systems ( IJDMS ), Vol.
2, No. 2, pp. 44-55.
[2]. Saidane, Ayda; Nicomette, V.; Deswarte, Y.,(2009).
“The Design of a Generic Intrusion-Tolerant Architecture for
Web Servers,” IEEE Transactions on Dependable and
Secure Computing, Vol.6, No.1, pp.45-58.
[3]. Wen-HsingKuo; Wanjiun Liao; Tehuang Liu,(2011).
“Adaptive Resource Allocation for Layer-Encoded IPTV
Multicasting in IEEE 802.16 WiMAX Wireless Networks,” IEEE
Transactions on Multimedia, Vol.13, No.1, pp.116 -124.
[4]. J.-R. Ohm (1998).“Description of core
experiments in
MPEG-4 video,” ISO/IEC JTCI/SC29/WG11, N2554.
[5]. (2006). Mean Opinion Score (MOS) Terminology,
2006/07, ITU-T Rec. P.800.1.
[6]. Z. Wu and J. M. Boyce, (2007). “Adaptive error
resilient
video coding based on redundant slices of H.264/AVC,” in
Proc. IEEE ICME, pp. 2138–2141.
[7]. P. Baccichet, S. Rane, A. Chimienti, and B. Girod,
(2007). “Robust lowdelay video transmission using
H.264/AVC redundant slices and flexible macroblock
ordering,” in Proc. IEEE ICIP, Vol. 4, pp. 93–96.
[8]. Tillo, T.; Grangetto, M.; Olmo, G.,(2008).
“Redundant
Slice Optimal Allocation for H.264 Multiple DescriptionCoding,’
,IEEE Transactions on Circuits and Systems for
Video Technology, Vol.18, No.1, pp.59-70.
[9]. Kishore Ramachandran, LiviuIftode and Ajay
Mohindra, “VaaS: Video as a Service on the Cloud”
[Online]. Available: http://nsfcloud2011.cs.ucsb.edu
/papers/Ramachandran_Paper.pdf.
[10]. [Online]. Available: http://www.csc.com/
managed_network_services/offerings/44522/51853-
video_as_a_service_vaas.
[11]. [Online]. Available:
http://www.mistralsolutions.com
/hs-downloads/tech-briefs/dec09-article-3.html.
[12]. [Online]. Available: http://en.wikipedia.org
/wiki/MVaaS.
[13]. [Online]. Available: http://en.wikipedia.org
/wiki/Comparison_of_video_hosting_services.
[14]. Guurler, C.G.; Goorkemli, B.; Saygili, G.; Tekalp,
A.M.,(2011). ”Flexible Transport of 3-D Video Over
Networks,” Proceedings of the IEEE, Vol.99, No.4, pp. 694-
707.
[15]. Ellen Messmer (2010). ”Security of
virtualization,
cloud computing divides IT and security pros”, Network
World, [Online].
Available:http://www.networkworld.com/article/2244954/virtualization/secu
rity-of-virtualization--
cloud-computing-divides-it-and-security-pros.html.
[16]. (2014). ”SHA-3 Standard: Permutation-Based
Hash
and Extendable-Output Functions", DRAFT FIPS PUB 202
,federal Information Processing Standards Publication
,[Online]. Available: http://csrc.nist.gov/
publications/drafts/fips-202/fips_202_draft.pdf.
[17]. (2012).”Tentative Timeline of the Development
of
New Hash Functions”, National Institute of Standards and
Technology (NIST), Information Technology Laboratory
[Online]. Available: http://csrc.nist.gov/
groups/ST/hash/timeline.html"NIST Selects Winner of
Secure Hash Algorithm (SHA-3) Competition". NIST.
[18]. Guido Bertoni, Joan Daemen, Michael Peeters and
Gilles Van Assche, (2011). “The Keccak sponge function
family:Specifications summary “ Ref:http://
keccak.noekeon.org/specs_summary.html .
[19]. (2015). “Cryptographic hash function“,
[Online].
Available:http://en.wikipedia.orgwiki/Cryptographic
_hash_function.
[20]. Guido Bertoni, Joan Daemen,MichaelPeeters and
Gilles Van Assche, (2007). “Sponge Functions”, ECRYPT
Hash Workshop, [Online].
[21]. Guido Bertoni, Joan Daemen, Michael Peeters and
Gilles Van Assche,(2008). “On the Indifferentiability of the
Sponge Construction”, EuroCrypt.
[22]. “Keccak implementation overview Version
3.2”
[Online]. Available:http://keccak.noekeon.org/Keccakimplementation-
3.2.pdf
[23]. Guo, Xu; Huang, Sinan; Nazhandali,Leyla;
Schaumont, Patrick, (2010). “Fair and Comprehensive
Performance Evaluation of 14 Second Round SHA-3 ASIC
Implementations”, NIST 2nd SHA-3.
[24]. (2001). TREC Video Retrieval Test Collection
[Online].Available:http://www.open-video.org/collection_detail.
php?cid=7.
[25]. Kesavaraja, D.; Shenbagavalli, A.,(2013).
“Cloud
video as a Service [VaaS] with storage, streaming, security
and Quality of service: Approaches and directions”,
International Conference on Circuits, Power and
Computing Technologies (ICCPCT), pp.1093-1098.
[26]. Online]. Available:http://en.wikipedia.org
/wiki/Precision_and_recall.
[27]. Powers, David M. W (2011). “Evaluation: From
Precision, Recall and F-Measure to ROC, Informedness,
Markedness& Correlation”, Journal of Machine Learning
Technologies, pp. 37–63.
[28]. Perruchet, P.; Peereman, R. (2004).“The
exploitation
of distributional information in syllable processing”. J.
Neurolinguistics, pp. 97–119.
[29]. Fawcett, Tom (2006). “An Introduction to ROC
Analysis”, Pattern Recognition Letters, pp. 861 – 874.
[30]. Olson, David L.; and Delen, Dursun (2008).
Advanced Data Mining Techniques, Springer, 1st edition
(February 1, 2008), pp.138.