Comparative Study of Video Encryption Techniques for HEVC
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Study of different Encryption techniques focuses on newly video codec which is high efficiency video codec (HEVC). It focused on the different recent methods of video protection. Development of HEVC standard is main target of researchers now a day.in this paper survey summarizes the latest research results of protection of HEVC video codec as well as we also compare the different protection approach of H264/AVC Video codec. Digital video transmission on unauthorized channel needs some protection to avoid the unwanted attacks on multimedia content. Data hiding in such encrypted domain without decryption also preserves the confidentiality of the content.so, the encryption of such a large multimedia is very much cumbersome for that reason we summarize and analyses selective encryption scheme used on video content. Comparison and analysis of different encryption domain gives some concrete conclusion about the guaranteed protection. The main objective of video encryption is video should be in format compliance after applying encryption algorithm.it allows to play video even after encryption so transmission of such format compliance encrypted video has less memory requirement
Authors and Affiliations
Sagar. S. Hade, Sonal. K. Jagtap
Evolution of Routing Protocols for Wireless Sensor Networks – A Survey
WSN is a set of small power energy confined sensor nodes which can dynamically forms a network without the use of an existing network or without the use of a centralized administration. In WSN, the biggest constraint is...
Li-Fi Based A New Home Automation System
This paper presents a design and system implementation of new home automation system that uses Li-Fi technology as a network infrastructure. The proposed system consists of two main components; the first part is the web...
slugCloud Computing
Cloud Computing is basically an internet-based network made up of large number of Servers – mostly based on open standards, modular and inexpensive. Clouds contain vast amount of information and provide a variety of ser...
Database Security
Database security concerns the increase in the number of reported incidents as per evidenced by growing in terms of loss or unauthorized exposure to the sensitive data . The amount of data is collected, retained and sha...
Pattern Matching and Analysis of Vehicle Number Plate’s Recognition System Using Template Matching
A pattern is any arrangement of objects or entities. The term "arrangement" is used here to indicate that a pattern is by definition non-random and at least potentially describable. All theories imply some pattern, but...