An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 145 , Downloads: 108 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

The privacy and security becomes the major issues since the multimedia is transmitted openly over the network. Along with the privacy and security, storage space is also an important point that cant be missed. So it is necessary to provide the privacy and security to the multimedia with help of encryption. This work presents design and implement of an efficient video encryption of uncompressed AVI system, where lossy compression is considered. The AVI (Audio Video Interleaved) file which is uncompressed divided into frames and audio which will be encrypted. Here a new modified International Haar Wavelet is used to encrypt the full video in an efficient secure manner, after encryption the frame and audio will be decomposes and deliver final uncompressed video. The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security and efficiency.

Keywords: Encryption, AVI, Haar wavelet, uncompressed video

Edition: Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

Share this Article

How to Cite this Article?

Minal C. Toley, Mayur S.Burange, "An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141221, Volume 3 Issue 11, November 2014, 1939 - 1942

145 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Similar Articles with Keyword 'AVI'

Views: 229 , Downloads: 151 | CTR: 66 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 38 , Downloads: 31 | CTR: 82 % | Weekly Popularity: ⮙13

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 43 , Downloads: 41 | CTR: 95 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 127 , Downloads: 95 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article

Similar Articles with Keyword 'Haar wavelet'

Views: 172 , Downloads: 105 | CTR: 61 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Views: 140 , Downloads: 108 | CTR: 77 %

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 829 - 833

Comparison of Video Shot Detection and Video Summarization Techniques

Vijay Kumar D, Santhosh Kumar K.L, Jharna Majumdar

Share this Article

Views: 145 , Downloads: 108 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article

Views: 124 , Downloads: 110 | CTR: 89 % | Weekly Popularity: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1516 - 1519

A Survey: An Efficient Approach towards Thunderstorm Detection Using Saliency Map

Rasika Gawande, Prof. Namrata Ghuse

Share this Article

Views: 148 , Downloads: 114 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 774 - 778

Robust Invisible Watermarking Using OSTU Method and DWT

Abha Gaur, Akhilesh Pandey

Share this Article

Similar Articles with Keyword 'uncompressed video'

Views: 152 , Downloads: 106 | CTR: 70 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Views: 145 , Downloads: 108 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article
Top