Different Reviews on Video Encryption Using Transform and Coding
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Multimedia networks such as multimedia electronic mail, Internet television, and video conferences are included among communication systems with high transmission rate in computer and communication networks. Multimedia encryption challenges originate from two realities: firstly, multimedia data have great volumes. Secondly, they need real-time uses. So, using encryption for security results in additional computations for information processing. As a result, a balance between security and synchronization requirement is necessary. To reach this aim, we use lightweight and high-speed encryption algorithms need to encrypt the video sequence of frames. In the current work we are going to present the different reviews of Video encryption.
Authors and Affiliations
Manisha Sharma, Kamaljeet kaur
Comparison of Power and Delay in Different Types of Full Adder Circuit
In this review paper 1-bit CMOS full adder cells are studied using standard static CMOS logic style. The comparison is carried out using several parameters like number of transistors, delay, power consumption and power...
Value Engineering In Construction Industry
The Value Engineering is an intensive, interdisciplinary problem solving activity that focuses on improving the value of the functions that are required to accomplish the goal, or objective of any product, process, serv...
1-Φ High Step-Up Converter with MB MPPT for Half-Bridge PV Inverter System
In this paper a 1-ϕ high step-up converter with model based mppt for half-bridge inverters is proposed. The high stepup converter not only boosts the relatively low photovoltaic voltage to high bus voltage but also offer...
Person Identification Technique Using Human Iris Recognition
The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique iris is well suited to be applied to access control and pro...
Automated Attendance Marking
The Internet of Things (IoT) is the network of physical objects — devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity — that enables these objects to colle...