Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
6 pages
1 file
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications.
IJSRD, 2014
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications. We investigate the novelty of secure data for e.g. Multimedia data Transmission using cryptographic techniques. Over the last few years several encryption algorithms have applied to secure video transmission. Comparison between Symmetric and Asymmetric methods and representative video algorithms were presented. After comparison we propose encryption algorithm that is the International Data Encryption Algorithm a Symmetric Block Cipher for protection of the multimedia data. Advantages of our encryption algorithms not only lie in fast and easy implementation but also in providing considerable security. A software tool MATLAB will be used to implement algorithm for comparing video encryption methods.
An explosion in the internet and other sharing technologies has made transfer and distribution of video content extremely easy. Unimpeded transfer of video and other multimedia content has lead to violation of several antipiracy laws today. Hence, the need to prevent unauthorized distribution and protection of video data is on the rise. This paper demonstrates the lossless video encryption and decryption techniques. For encrypting the frames of the video, column and row shifting method is used, that is transposition cipher is generated. Further a password is used to encrypt the video as well.
Int. J. Comput. Theory Eng, 2010
International Journal of Computer Applications, 2013
Securing multimedia data has become of utmost importance especially in the applications related to military purposes. With the rise in development in computer and internet technology, multimedia data has become the most convenient method for military training. An innovative encryption algorithm for videos compressed using H.264 was proposed to safely exchange highly confidential videos. To maintain a balance between security and computational time, the proposed algorithm shuffles the video frames along with the audio, and then AES is used to selectively encrypt the sensitive video codewords. Using this approach unauthorized viewing of the video file can be prevented and hence this algorithm provides a high level of security. A comparative study of the proposed algorithm with other existing algorithms has been put forward in this paper to prove the effectiveness of the proposed algorithm.
Journal of emerging technologies and innovative research, 2019
The rapid advancement in the field of computer network and Internet has increased the easiness of Data Communication. This kind of advancement has expanded the dread of sneaking the information while sending information from the sender to the receiver. Picture and video are two of the most essential types of transmitting data. With the assistance of Image and video encryption techniques, a specific arrangement of pictures or recordings can be transmitted without stressing over security. In the proposed paper an extremely straightforward and constant calculation, utilizing pixel mapping, is utilized for the encryption of the pictures which are the fundamental building squares of any video record. In the proposed research paper, the video is divided into number of frames utilizing a MATLAB code and every one of the frames are sequentially stored. Each such frame contains a mix of red, blue and green layers. If we consider a pixel equivalent to 8 bit than every pixel has the value in t...
International Journal of Advance Research and Innovative Ideas in Education, 2016
In today’s world, security and protection issues of the transmitted information have turned into a vital worry in media innovation. In the course of the most recent couple of years a few encryption algorithms have connected to secure video transmission. While countless encryption plans have been proposed in the literature and some have been utilized as a part of genuine items, cryptanalytic work has demonstrated the presence of security issues and different shortcomings in the greater part of the proposed interactive media encryption plans. In this paper, International Data Encryption Algorithm (IDEA) is a symmetric key encryption method and utilizations 128 -bitkey more than 64-bit plain content with eight and a half round. To improve the innovation in IDEA, another methodology is presented in which we will set up two distinctive keys for encryption and decoding separately which was single key in IDEA. This will present more security in IDEA by making it an asymmetric key encryptio...
Ijca Proceedings on Recent Advances in Wireless Communication and Artificial Intelligence, 2014
With the fast expansion of a variety of multimedia technologies, further and more multimedia statistics are produced and transmitted in the fields like military, medical and for further commercial field which may have some susceptible information that is not to be supposed to be seen or accessed by or may only be shown partially to the common users. Therefore, security and privacy has turn out to be significant phase. Over the last few years numerous encryption algorithms are introduced to secure and protect the video during transmission. Along with that many efficient multimedia encryption schemes are introduced and real world is using those techniques. In this paper, various techniques are observed described showing encryption methods and video transmission techniques have been studied.
2013
Various video encryption techniques are purposed to encrypt the videos and used for obtaining highly encrypted videos. The paper focuses on different existing methods for video techniques. It focuses on the full or selective encryption techniques & various schemes under it. This survey provides information about the existing methods and their improvements, hence providing a platform for new researchers for innovating new techniques for further research.
In the digital world nowadays, multimedia security is becoming more and more important with the continuous increase in the use of digital communications on the Internet. In addition, special and reliable security in storage and transmission of digital images and videos is needed in many digital applications, such as pay-TV, confidential video conferencing and medical imaging systems, etc. Unfortunately, the classical techniques for data security are not appropriate for the current multimedia usage. As a result, we need to develop new security protocols or adapt the available security protocols to be applicable for securing the multimedia applications. Generally speaking, the well-developed modern cryptography should be the perfect solution for this task. In this paper, we show that AES algorithm can be used for securing real time video transmission with little processing overhead over the Internet. We support our study with exhaustive comparison between AES and XOR encryption algorithms with normal transmission.
Vidhyayana
Transmission of digital content has increases tremendously these days. Privacy and security of the transmitted data has become an important concern in multimedia applications because multimedia data has been an essential part of our lives, from instant messaging applications to social media. For security of the data we use different techniques like cryptography, steganography, and scrambling. Cryptography is one of the main techniques used for information security which includes many forms like digital signatures, authentication etc. and performs system security, confidentiality, data integrity and other functions. This paper works on dual layer security systems using (Elliptic-Curve cryptography) ECC and (Modified Advanced Encryption Standard) MAES called EMAES on Multimedia files (Text, Audio, and Video). Using this approach, unauthorized viewing of the multimedia file can be prevented. Also, this algorithm provides a high level of security and efficiency as compared to existing o...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Rajshahi University Journal of Science and Engineering, 2016
Information Encryption and Cyphering
SYSTEMATICS, 2020
World Review of Science, Technology and Sustainable Development
2009 International Conference on Networking and Media Convergence, 2009
Int. J. Comput. Electr. …, 2010