International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

In this growing digital world; everything is on air and a lot of multimedia data flows online every second. Day by day more and more multimedia technologies are being introduced and videos are the emerging multimedia content to be taken care of. There are several fields like military; medical and commercial susceptible information that need to be secured or may only be shown partially to the users. Over the last few years numerous encryption algorithms are introduced to secure and protect the video during transmission. Along with that many efficient multimedia encryption schemes are introduced and real world is using those techniques. In this paper; a new technique is proposed to secure the transmission of the video over wireless networks. This technique includes the functionality of three algorithms and introducing a more efficient technique to encrypt the video sequences. This technique is to encrypt the individual frame and using this technique over all video frame sequences to encrypt the video and this will multiply the security effects of the single frame over the full video sequence.

Keywords: SCAN, DES, Encryption, Entropy, NPCR, UACI

Edition: Volume 3 Issue 6, June 2014

Pages: 2526 - 2530


How to Cite this Article?

Ronak Dak, Dharm Singh, Naveen Choudhary, "A Newly Proposed Light-Weight Technique to Secure Videos", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014717, Volume 3 Issue 6, June 2014, 2526 - 2530

24 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SCAN'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 473 - 475

Data Mining for Sales Prediction in the Tourism Industry

Pratiksha Jain, N. Partheeban, Rajkumar R.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1132 - 1135

Robust Approach for Product Label Reading

Shradha Vitthalrao Chalikwar, Sinu Nambiar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this article



Similar Articles with Keyword 'DES'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 496 - 497

Naive Buyers Theorem for Heart Disease Prediction System

Indu Kumari, Dinesh Kumar Bahgel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this article



Similar Articles with Keyword 'Entropy'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 487 - 491

Policy based Collaborative Tagging for Privacy Protection

Benazeer Inamdar, Gyankamal Chhajed

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2318 - 2322

An Adaptive Histogram Values & Texture Descriptor for Data Analysis

Ritika Verma, Vinay Thakur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1295 - 1299

Image Denoising Using Hybrid Thresholding, DWT and Adaptive Intensity Transformations

Taranjot Kaur

Share this article

Research Paper, Computer Science & Engineering, Turkey, Volume 3 Issue 5, May 2014

Pages: 1258 - 1263

A Real-Time H.265 Codec

Shaima Safaaldin, Ergun Erelbi

Share this article



Similar Articles with Keyword 'NPCR'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this article



Similar Articles with Keyword 'UACI'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1222 - 1227

Nearest Neighbor Search Technique for Novel Queries

P. R. Shejawal, J. R. Pansare, G. S. Pole

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3119 - 3124

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2526 - 2530

A Newly Proposed Light-Weight Technique to Secure Videos

Ronak Dak, Dharm Singh, Naveen Choudhary

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this article
Top