Different Reviews on Video Encryption Using Transform and Coding

Abstract

Multimedia networks such as multimedia electronic mail, Internet television, and video conferences are included among communication systems with high transmission rate in computer and communication networks. Multimedia encryption challenges originate from two realities: firstly, multimedia data have great volumes. Secondly, they need real-time uses. So, using encryption for security results in additional computations for information processing. As a result, a balance between security and synchronization requirement is necessary. To reach this aim, we use lightweight and high-speed encryption algorithms need to encrypt the video sequence of frames. In the current work we are going to present the different reviews of Video encryption.

Authors and Affiliations

Manisha Sharma, Kamaljeet kaur

Keywords

Related Articles

Comparison of Power and Delay in Different Types of Full Adder Circuit

In this review paper 1-bit CMOS full adder cells are studied using standard static CMOS logic style. The comparison is carried out using several parameters like number of transistors, delay, power consumption and power...

Value Engineering In Construction Industry

The Value Engineering is an intensive, interdisciplinary problem solving activity that focuses on improving the value of the functions that are required to accomplish the goal, or objective of any product, process, serv...

1-Φ High Step-Up Converter with MB MPPT for Half-Bridge PV Inverter System

In this paper a 1-ϕ high step-up converter with model based mppt for half-bridge inverters is proposed. The high stepup converter not only boosts the relatively low photovoltaic voltage to high bus voltage but also offer...

Person Identification Technique Using Human Iris Recognition

The security is an important aspect in our daily life whichever the system we consider security plays vital role. The biometric person identification technique iris is well suited to be applied to access control and pro...

Automated Attendance Marking

The Internet of Things (IoT) is the network of physical objects — devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity — that enables these objects to colle...

Download PDF file
  • EP ID EP20102
  • DOI -
  • Views 283
  • Downloads 4

How To Cite

Manisha Sharma, Kamaljeet kaur (2015). Different Reviews on Video Encryption Using Transform and Coding. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20102