A RANDOMIZED SELECTIVE ENCRYPTION USING HASHING TECHNIQUE FOR SECURING VIDEO STREAMS
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Digital video transmissions are widely used in network nowadays. Hence, securing its contents and keeping privacy is vital. Several encryption algorithms have been proposed earlier to achieve secure video transmission. But altogether attaining efficiency, security and flexibility is a major challenge. To transmit a digital video, encryption is necessary to protect its contents from attacks. As the size of the videos are usually large their contents has to be compressed before transmission. Encryption is applied on the video content after compression. One of the encryption technique selective encryption is used for encrypting video. It encrypts only a subset of data. The selective encryption algorithm reduces the amount of the data to be encrypted and achieves a required level of security. In this paper we study the existing selective encryption algorithm and its classifications. The challenges in the selective encryption algorithms and some future directions are presented.
Authors and Affiliations
Lizyflorance. C , Lalitha Kumari. R , Prof. John Singh K
Classification of Herbs Plant Diseases via Hierarchical Dynamic Artificial Neural Network after Image Removal using Kernel Regression Framework
When herbs plants has disease, they can display a range of symptoms such as colored spots, or streaks that can occur on the leaves, stems, and seeds of the plant. These visual symptoms continuously change their color, sh...
Genetic Algorithm Based Adaptive Learning Scheme Generation For Context Aware E-Learning
Context aware e-learning system helps to provide elearning contents which are customized according to the learner’s ontext. For generating context aware contents many adaptation parameters have to be considered. Customi...
Optimizing Live Digital Evidence Mining Using Structural Subroutines of Apriori Algorithm
The Scope and Complexity of the Internet has grown exponentially. This growth has made digital forensic investigation a very challenging task. Even the modest intra-organizational networks have sufficient network traffic...
A Survey paper: Data Security in Local Networks Using Distributed Firewalls
Computer and Network security are the means of prevention and detection of unauthorized actions by users of computer system. The unauthorized action can be defined by the security policies which defines the security rule...
Improved Self Fused Check pointing Replication for Handling Multiple Faults in Cloud Computing
The performance of checkpointing replication fault tolerance technique is severely bottlenecks due to handling of number of replicas generated for a large number of nodes to tolerate multiple faults such as multiple fail...