A RANDOMIZED SELECTIVE ENCRYPTION USING HASHING TECHNIQUE FOR SECURING VIDEO STREAMS
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Digital video transmissions are widely used in network nowadays. Hence, securing its contents and keeping privacy is vital. Several encryption algorithms have been proposed earlier to achieve secure video transmission. But altogether attaining efficiency, security and flexibility is a major challenge. To transmit a digital video, encryption is necessary to protect its contents from attacks. As the size of the videos are usually large their contents has to be compressed before transmission. Encryption is applied on the video content after compression. One of the encryption technique selective encryption is used for encrypting video. It encrypts only a subset of data. The selective encryption algorithm reduces the amount of the data to be encrypted and achieves a required level of security. In this paper we study the existing selective encryption algorithm and its classifications. The challenges in the selective encryption algorithms and some future directions are presented.
Authors and Affiliations
Lizyflorance. C , Lalitha Kumari. R , Prof. John Singh K
Design and Simulation for Producing Two Amplitude Matched Anti-phase Sine Waveforms Using ±2.5 V CMOS Current-Mode Approach
In this paper the current mode approach called “Current Conveyor (CCII+)” has been incorporated to design and simulate the circuit for producing two amplitude matched anti-phase sine waveforms which are frequently used i...
AN OVERVIEW OF BIOMETRICS
The term biometrics is derived from the Greek words bio eaning “life” and metrics meaning “ to measure” . Biometrics refers to the identification or verification of a person based on his/her physiological and/or behavio...
Ontology-based Semantic Search Engine for Healthcare Services
With the development of Web Services, the retrieval of relevant services has become a challenge. The keyword-based discovery mechanism using UDDI and WSDL is insufficient due to the retrieval of a large amount of irrelev...
CLASSIFICATION OF LAND USE LAND COVER CHANGE DETECTION USING REMOTELY SENSED DATA
Image classification is perhaps the most important part of digital image analysis. With supervised classification, the information classes of interest like land cover type image. These are called “training sites”. The im...
INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE
This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...