A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important issue. Many researchers have proposed various methodologies to maintain security and privacy before digital video transmission. Hence the digital videos are encrypted by using various encryption methods. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. For data hiding there is a need of better data hiding algorithm that will work on encrypted media. This paper focuses on the interoperability of video encryption & data hiding method with existing processes for the video streams. In this survey we present an overview and classification of the various encryption and data hiding methods for video streams.

Keywords: Data hiding, Encrypted domain, H264/AVC video streams

Edition: Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

Share this Article

How to Cite this Article?

Shrutika S. Giradkar, Antara Bhattacharya, "A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141338, Volume 3 Issue 11, November 2014, 1642 - 1643

71 PDF Views | 56 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data hiding'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Similar Articles with Keyword 'Encrypted domain'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 615 - 621

Advance Robust Watermarking Of Compressed and Encrypted Digital Media

Mohammad Asif Iqbal, Kemal Koche

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 432 - 436

Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images

A. Mallareddy, P Anjibabu

Share this Article
Top