A Survey Report on Video Encryption and Decryption Techniques

نویسندگان

  • Saraswati Singh
  • Nilmani Verma
  • Vinay Kumar
چکیده

With the increase in the development of multimedia technologies, the multimedia data are transmitted in the various fields like commercial, video conferencing, medical and military fields, which generally include some sensitive data. Hence there is a great demand for transmission technique. Cryptography is becoming most popular for communication any type of sensitive data. There are various encryption algorithms have been proposed for the video transmission and reception which are discovered from time to time to encrypt the video data to make more secure and in addition focuses on compression efficiency. This paper shows a study report on various video encryption algorithms and presents a survey of over 15 research papers dealing with video encryption and decryption techniques. Keywords— Encryption, Decryption, Cipher, Decipher, Compression

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Different Image Encryption and Decryption Techniques and Ka Image Cryptography

In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. This paper focuses mainly on the different kinds of image encryption and decryption techniques and a new technique to encrypt image so that image can beco...

متن کامل

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014