Academia.eduAcademia.edu

Figure 2: A comparison between (a) the traditional approach to secure image and video commu-

Figure 2 A comparison between (a) the traditional approach to secure image and video commu-