Survey on Crowd-Source Video Sharing Systems
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Nowadays video capturing from mobile and sharing it is common. Consider it be any event, function, performance by an artist, any surprising event. For example, if any famous speaker addressing huge number ofpeople, then this event there may be many people who capture the event in their mobile phones and uploaded it on the video sharing applications (VSA) such as YouTube, Twitter, Facebook. Same event is captured by thehundreds of the devices and uploaded on VSA. This leads to some issues like, huge amount of the bandwidth and battery is use by this activity of uploading videos of the same event and it might also cause the problem while retrieving that video. Numbers of approaches are proposed in the literature to address such problems such as on-demand approach in which first user query is matched to the metadata stored at the server and then data is fetched from user who uploaded the video.We described number of techniques available which gives solution for video sharing and retrieval problems.
Authors and Affiliations
A. S. Kadam , R. V. Dagade
RKO Technique for Color Visual Cryptography
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algo...
Health Diagnosis Using Wban Technology
Abstract: Invention of the low power consuming wireless sensors are raising the emergence for the usage of wireless body area networks (WBAN).WBAN is widely used in many applications such as entertainment, gaming,...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
A Study of Universal Design and Web Accessibility of Websites with High Purpose Using of the Internet
As the Internet has become an essential tool in human life, a need for building accessible web pages is being emphasized. Universal design indicates implementation of products and services that are fair and easy to use,...
Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techni...