A Newly Proposed Light-Weight Technique to Secure Videos
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

In this growing digital world; everything is on air and a lot of multimedia data flows online every second. Day by day more and more multimedia technologies are being introduced and videos are the emerging multimedia content to be taken care of. There are several fields like military; medical and commercial susceptible information that need to be secured or may only be shown partially to the users. Over the last few years numerous encryption algorithms are introduced to secure and protect the video during transmission. Along with that many efficient multimedia encryption schemes are introduced and real world is using those techniques. In this paper; a new technique is proposed to secure the transmission of the video over wireless networks. This technique includes the functionality of three algorithms and introducing a more efficient technique to encrypt the video sequences. This technique is to encrypt the individual frame and using this technique over all video frame sequences to encrypt the video and this will multiply the security effects of the single frame over the full video sequence.

Keywords: SCAN, DES, Encryption, Entropy, NPCR, UACI

Edition: Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

Share this Article

How to Cite this Article?

Ronak Dak, Dharm Singh, Naveen Choudhary, "A Newly Proposed Light-Weight Technique to Secure Videos", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014717, Volume 3 Issue 6, June 2014, 2526 - 2530

75 PDF Views | 65 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SCAN'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1739 - 1741

An Internet Relay Chat Bot using AIML

Om Komawar, Prasad Thakar, Rohit Shetty, Akshay Bartakke, Prof. Manisha Desai

Share this Article

Similar Articles with Keyword 'DES'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Similar Articles with Keyword 'Entropy'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2515 - 2518

Ameliorating Brain Image Segmentation Using Fuzzy Clustering Techniques

Sana Tak, Toran Verma

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2318 - 2322

An Adaptive Histogram Values & Texture Descriptor for Data Analysis

Ritika Verma, Vinay Thakur

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1459 - 1464

A Study on Measurement and Classification of Twitter Accounts

N. Ashwan Kumar, Jayendra Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1563 - 1567

Image Denoising Using Hybrid Thresholding, MFHT and Hybrid Post Filtering

Taranjot Kaur, Manish Mittal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Similar Articles with Keyword 'NPCR'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article

Similar Articles with Keyword 'UACI'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1222 - 1227

Nearest Neighbor Search Technique for Novel Queries

P. R. Shejawal, J. R. Pansare, G. S. Pole

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3119 - 3124

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article
Top