A Newly Proposed Light-Weight Technique to Secure Videos
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 114 | Weekly Hits: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

In this growing digital world; everything is on air and a lot of multimedia data flows online every second. Day by day more and more multimedia technologies are being introduced and videos are the emerging multimedia content to be taken care of. There are several fields like military; medical and commercial susceptible information that need to be secured or may only be shown partially to the users. Over the last few years numerous encryption algorithms are introduced to secure and protect the video during transmission. Along with that many efficient multimedia encryption schemes are introduced and real world is using those techniques. In this paper; a new technique is proposed to secure the transmission of the video over wireless networks. This technique includes the functionality of three algorithms and introducing a more efficient technique to encrypt the video sequences. This technique is to encrypt the individual frame and using this technique over all video frame sequences to encrypt the video and this will multiply the security effects of the single frame over the full video sequence.

Keywords: SCAN, DES, Encryption, Entropy, NPCR, UACI

Edition: Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

Share this Article

How to Cite this Article?

Ronak Dak, Dharm Singh, Naveen Choudhary, "A Newly Proposed Light-Weight Technique to Secure Videos", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014717, Volume 3 Issue 6, June 2014, 2526 - 2530

Enter Your Registered Email Address





Similar Articles with Keyword 'SCAN'

Downloads: 104 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Downloads: 105 | Weekly Hits: ⮙5 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1141 - 1146

Offline Hindi Signature Recognition Using Surf Feature Extraction and Neural Networks Approach

Harpreet Kaur, Simarjeet Kaur

Share this Article

Downloads: 106 | Monthly Hits: ⮙12

Case Studies, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2158 - 2160

BPL Intruders

Kushalkumar Naidu, Pavankumar T, Laxmisai Ramprasad A, Sumathi N, J Nagesh Babum.S

Share this Article

Similar Articles with Keyword 'DES'

Downloads: 126 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Entropy'

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1954 - 1957

Proposed Techniques to Remove Flaming Problems from Social Networking Sites and outcome of Na?ve Bayes Classifier for Detection of Flames

Vishakha Mal, Dr. A. J. Agrawal

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1563 - 1567

Image Denoising Using Hybrid Thresholding, MFHT and Hybrid Post Filtering

Taranjot Kaur, Manish Mittal

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2318 - 2322

An Adaptive Histogram Values & Texture Descriptor for Data Analysis

Ritika Verma, Vinay Thakur

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1295 - 1299

Image Denoising Using Hybrid Thresholding, DWT and Adaptive Intensity Transformations

Taranjot Kaur

Share this Article

Similar Articles with Keyword 'NPCR'

Downloads: 114 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this Article

Downloads: 128 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article

Similar Articles with Keyword 'UACI'

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3119 - 3124

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain

Share this Article

Downloads: 110 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1222 - 1227

Nearest Neighbor Search Technique for Novel Queries

P. R. Shejawal, J. R. Pansare, G. S. Pole

Share this Article

Downloads: 114 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this Article

Downloads: 128 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article



Top