Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Content System

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain

Image Authentication techniques enable the recipients to verify the integrity of the received image. In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed. In this proposed scheme, the content based image feature is extracted from the OPT domain and the image hash which is used ...

متن کامل

A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing

Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key man...

متن کامل

Multimedia Content protection Based on Commutative Watermarking and Cryptographic Technique

Watermarking embeds information into a digital signal like images. Watermarking Technologies are being regarded as a vital mean to proffer copyright protection of digital signals. The effectiveness of watermarking and Encryption technique is indicated by the robustness of embedded watermarks against various attacks such as, Rotation, Resizing, etc. In this paper, a novel Commutative Watermarkin...

متن کامل

An Efficient Multimedia DRM Technique using Secure Arithmetic Coding

The digital rights management (DRM) techniques are very important in the fields of multimedia security. The major areas of multimedia data security includes secrecy, ownership protection and traitor tracing. Even though, a number of encryption techniques were developed for multimedia encryption, most of them are vulnerable to several types of attacks. Hence, an encryption system having better s...

متن کامل

Reliability analysis of a robotic system using hybridized technique

In this manuscript, the reliability of a robotic system has been analyzed using the available data (containing vagueness, uncertainty, etc). Quantification of involved uncertainties is done through data fuzzification using triangular fuzzy numbers with known spreads as suggested by system experts. With fuzzified data, if the existing fuzzy lambda–tau (FLT) technique is employed, then the comput...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering Research and Applications

سال: 2017

ISSN: 2248-9622

DOI: 10.9790/9622-0705031014