Review on Data Hiding Schemes into Multimedia Data
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
In this period of internet, Multimedia data security is crucial issue because there are many cases of illegal production and redistribution through the Internet. Data hiding and encryption algorithms can be used for Security and protection of multimedia data. Video encryption is new area of research for researchers. Data hiding in encrypted videos is important to conquer the aim of content annotation, copy right protection, access control and/or tapering detection. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including advanced video Coding.
Authors and Affiliations
Ashwini G. Kamble| Computer Engineering ZES’s DCOER, Pune. ashwinikamble1992@gmail.com, Prof. Nikita J. Kulkarni| Computer Engineering ZES’s DCOER, Pune, nikita.kulkarni@zealeducation.com
Dairy Automation Using Controlled Area Network Protocol
In these days automation in industry’s increases rapidly. For safety purpose and to reduce man power requirement automation is adapted by industries. Some automation is fully automatic and some require human driver...
An Efficient Data User Authentication Protocol to Enable Data User Revocation
Cloud computing offer favorable circumstances to individual customers and affiliations which minimizes endeavor and resource use cost. Information owners sending the data to cloud servers without adjacent data organi...
Data integrity and Auditing for Secured Cloud Data Storage
Time and Trend has its own significance to build the technology smarter, better and easier to the end user.To the Better stretch of the Information Technology, the Innovation and renovation has changed computing appr...
A Routing Algorithm To Reduce The Queueing Complexity In Communication Networks
A new adaptive routing algorithm built ahead the widely studied back-pressure algorithm. We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to r...
Challenges and Issues of Data Security in Cloud Computing
Cloud computing is still in its infancy in spite of gaining tremendous momentum recently, high security is one of the major obstacles for opening up the new era of the long dreamed vision of computing as a utility. A...