A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important issue. Many researchers have proposed various methodologies to maintain security and privacy before digital video transmission. Hence the digital videos are encrypted by using various encryption methods. For the purpose of content notation and/or tampering detection, it is necessary to perform data hiding in these encrypted videos. For data hiding there is a need of better data hiding algorithm that will work on encrypted media. This paper focuses on the interoperability of video encryption & data hiding method with existing processes for the video streams. In this survey we present an overview and classification of the various encryption and data hiding methods for video streams.

Keywords: Data hiding, Encrypted domain, H264/AVC video streams

Edition: Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

Share this Article

How to Cite this Article?

Shrutika S. Giradkar, Antara Bhattacharya, "A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141338, Volume 3 Issue 11, November 2014, 1642 - 1643

116 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data hiding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Similar Articles with Keyword 'Encrypted domain'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 615 - 621

Advance Robust Watermarking Of Compressed and Encrypted Digital Media

Mohammad Asif Iqbal, Kemal Koche

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 432 - 436

Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images

A. Mallareddy, P Anjibabu

Share this Article
Top