Secure Sharing and Searching of Video Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
Social networking has become a part of daily life of every smart phone user. Sharing real time images and videos produces huge amount of traffic as well as data every day. Tremendous amount of video data is stored and shared through multiple web and mobile application. This has given the rise to the need of secure infrastructure to store and share the user’s private videos. The proposed infrastructure that allows mobile user to securely share and search their real time video data by encrypting the data before uploading. So that, security issues like video leakage, etc. can be prevented. The mobile users can be able to share their real-time video through the cloud and only the authenticated user can get access to the shared videos. Any user who does not have rights to access the video will not be able to get any information about the video. It also allows secure searching within users own data. The access of shared video can be removed which can be used to recover the human errors which occurs while sharing the video. The security of video data is guaranteed even if the storage is hacked.
Authors and Affiliations
Dipali S. Yadav, Prof. Kanchan K. Doke
Motion Compensation Techniques Adopted In HEVC
High Efficiency Video Coding (HEVC) is currently being prepared as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The main goal of the HEVC standar...
A Survey on Advancements in Agriculture and Food Technologies
Before some year maximum percentage of Indian economy used to come from agriculture. But since few years economic contribution of agriculture to India’s GDP (gross domestic product) is declining slowly with the country’...
Secured Login Authentication on Key Attackers
An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password c...
Design and Implementation of Logic Gates and Adder Circuits on FPGA Using ANN
In this paper, Design and hardware implementation of multiple neurons on Field Programmable (FPGA)is done sequentially. First Multiple Neurons are implemented then logic Gates and Adder circuit are implemented using Fee...
Wide Bandwidth CMOS Low Noise Amplifier Using Matched Coplanar Waveguide Line for Wireless Communication
In this work, the simulation analysis of low noise amplifier and rectangular micro-strip patch antenna is proposed. In this, two different modules are proposed and analysed through Agilent ADS tool. Firstly, a rectangul...