scholarly journals Secured Video Transmission Using Encryption by MD5

Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The paper displays a computationally capable and secure video encryption approach with usage of appropriated and parallel condition. The paper expects to make secure video encryption practical for constant applications with no additional committed equipment at recipient side. Verifying is a major testing assignment especially with respect to affirmation of privacy, confirmation and uprightness. Writing indicates utilization of cryptography and steganography to verify distinctive types of computerized information. The wide utilization of correspondence utilizing Internet has encouraged sharing of content as well as sound and video posts in a less difficult way. A standard encryption calculation is particularly material for content and twofold information yet neglects to deal with voluminous video information. An endeavor has been made in the paper to verify recordings utilizing keyed hash calculations. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without trade off in nature of the video.

2019 ◽  
Vol 8 (4) ◽  
pp. 12977-12980

Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The research displays a computationally capable and secure video encryption approach with the usage of appropriated and parallel condition. The research expects to make secure video transformation practical for constant applications with no additional committed equipment at the recipient side. Checking is a significant testing task particularly as for the assertion of security, affirmation, and uprightness. The mixed media has been a detour to transmit which aides of inserting in OBS to furnish a safe route with lower rate buffering. The wide usage of a correspondence using the Internet has energized the sharing of mixed media source records posts in a less troublesome manner. A standard encryption count is especially material for content and twofold data yet fails to manage voluminous video data. Subsequently, this control has been giving a safe path transmission without gatecrasher which supports the HD information. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without tradeoff in the nature of the video.


2021 ◽  
Vol 18 (6) ◽  
pp. 9410-9429
Author(s):  
Qing Ye ◽  
◽  
Qiaojia Zhang ◽  
Sijie Liu ◽  
Kaiqiang Chen ◽  
...  

<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved on the basis of the ICMIC system and combined with CML, generates stream ciphers and encrypts some syntax elements of HEVC. The experimental results show that the stream cipher generated by the L-ICMIC-CML system passes the SP800-22 Revla test and has strong randomness. Applying the stream cipher to the proposed HEVC encryption scheme, through the analysis of the encryption scheme's security, encryption time and encryption efficiency, it is better than other chaotic system encryption schemes. The video encryption system proposed in this paper is both safe and efficient.</p> </abstract>


2018 ◽  
Vol 7 (S1) ◽  
pp. 58-62
Author(s):  
Gowrisankar Kalakoti ◽  
G. Prabhakaran ◽  
P. Sudhakar

With the improvement of mixed media information composes and accessible transfer speed there is immense interest of video retrieving frameworks, as clients move from content based recovery frameworks to content based retrieval frameworks. Determination of removed features assume an imperative job in substance based video retrieving paying little mind to video qualities being under thought. This work assists the up and coming analysts in the field of video retrieving with getting the thought regarding distinctive procedures and strategies accessible for the video recovery. These highlights are proposed for choosing, ordering and positioning as indicated by their potential enthusiasm to the client. Great feature determination likewise permits the time and space expenses of the recovery procedure to be lessened. This overview surveys the fascinating highlights that can be separated from video information for ordering and retrieving alongside likeness estimation techniques. We likewise recognize present research issues in territory of content based video retrieving frameworks.


2021 ◽  
Vol 2 (14) ◽  
pp. 68-86
Author(s):  
Andrii Byts ◽  
Volodymyr Sokolov ◽  
Nataliia Mazur ◽  
Valerii Kozachok ◽  
Anatoly Bessalov

The article considers the problem of ensuring the availability and integrity of wireless subscribers in cellular and other wireless corporate networks. The article aims to determine the threshold values for the moment of failure of video transmission, quantitative parameters, artifacts, and the number of errors for the image. Show the dependence of the integrity of data transmitted in real-time on the characteristics of the environment. Two approaches were used to assess the quality of video information: qualitative (image recognition assessment) and quantitative (error measurement). Because the research program was written in the Kotlin programming language, a library written in Java or Kotlin was required. After searching the library, it turned out that only three libraries meet such parameters as reliability, relevance, and availability of documentation: Jaffree, Xuggler, and VLCJ. After gathering information, it was found that the most common screen extensions for desktops are 1366 × 768 and for phones—360 × 640. An error occurred that RTP did not support more than one connection. Also, the RTSP protocol could not pass the experiment on codecs other than MP4V. The experiment stopped earlier than necessary without error. Judging by the indicators, this was a very high CPU load. All other protocols were successfully tested, and results were obtained. During the experiments, we encountered various video anomalies. The worst was the video playback problem with the MJPG codec. Other anomalies were also identified: frame delay, incorrect frame rendering, white noise, and white noise mixed with frames. It is clear how up to 128 kbps experiments are successful and then begin to stop the video stream without error information. According to the results of experiments, the H.264 codec performs best.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Luke Cranfill ◽  
Jeehyeong Kim ◽  
Hongkyu Lee ◽  
Victor Youdom Kemmoe ◽  
Sunghyun Cho ◽  
...  

MPEG-DASH is a video streaming standard that outlines protocols for sending audio and video content from a server to a client over HTTP. However, it creates an opportunity for an adversary to invade users’ privacy. While a user is watching a video, information is leaked in the form of meta-data, the size of data and the time the server sent the data to the user. After a fingerprint of this data is created, the adversary can use this to identify whether a target user is watching the corresponding video. Only one defense strategy has been proposed to deal with this problem: differential privacy that adds sufficient noise in order to muddle the attacks. However, that strategy still suffers from the trade-off between privacy and efficiency. This paper proposes a novel defense strategy against the attacks with rigorous privacy and performance goals creating a private, scalable solution. Our algorithm, “No Data are Alone” (NDA), is highly efficient. The experimental results show that our scheme is more than two times efficient in terms of excess downloaded video (represented as waste) compared to the most efficient differential privacy-based scheme. Additionally, no classifier can achieve an accuracy above 7.07% against videos obfuscated with our scheme.


2020 ◽  
pp. 164-193
Author(s):  
Thomas P. Crocker

This chapter highlights arguments on the trade-off thesis, which is fundamentally flawed. It emphasizes how deference to the president is inconsistent with a constitutional tradition that preciously guards decisions about liberty. It analyzes the core idea of constitutional trade-off that lacks a conception of how to compare values or how to describe what specific liberties must give way for something to gain in security. The chapter also illustrates the extent of gains and losses that are made in liberty or security and through processes of democratic deliberation that comport with American constitutionalism rather than reflexive claims that necessity requires a trade-off. It points out the ways of justifying extreme counterterrorism policy, which argues that necessitous circumstances require trade off in liberty for greater security.


Author(s):  
Nisvan Erkal ◽  
Lata Gangadharan ◽  
Boon Han Koh

AbstractDecision makers in positions of power often make unobserved choices under risk and uncertainty. In many cases, they face a trade-off between maximizing their own payoff and those of other individuals. What inferences are made in such instances about their choices when only outcomes are observable? We conduct two experiments that investigate whether outcomes are attributed to luck or choices. Decision makers choose between two investment options, where the more costly option has a higher chance of delivering a good outcome (that is, a higher payoff) for the group. We show that attribution biases exist in the evaluation of good outcomes. On average, good outcomes of decision makers are attributed more to luck as compared to bad outcomes. This asymmetry implies that decision makers get too little credit for their successes. The biases are exhibited by those individuals who make or would make the less prosocial choice for the group as decision makers, suggesting that a consensus effect may be shaping both the belief formation and updating processes.


2015 ◽  
Vol 14 (3) ◽  
pp. 267-278 ◽  
Author(s):  
Caetlin Benson-Allott
Keyword(s):  

Architects have long held that visual encounters with designed spaces bring viewers into new worlds and generate new sensations and attitudes. As Peter Kraftl and Peter Adey write, ‘spaces are made in an ongoing, contingent sense, in styles that are not only symbolic, but more than representational – haptic, performative, material, and affective.’ Designed spaces interact with and affect the bodies they come in contact with; in short, they generate affect, including horror. By examining two very different types of built worlds – namely Lee Bontecou’s mixed-media wall-mounted sculptures (1959–1966) and the Nostromo set of Ridley Scott’s Alien (1979) – the author explores how visual encounters with the horror of the void unveil horror’s operation as a non-narrative zone of intensity. These examples reveal the differences between horror and fear, dread, and disgust (affects typically evoked by horror narratives) and horror’s independence from narrative and even figuration.


Author(s):  
Martin Ruhs

This chapter examines how high-income countries' restrictions of labor immigration and migrant rights affect the interests of migrants and their countries of origin, and how migrants and sending countries have engaged with these restrictions in practice. Labor immigration policies are “made” in receiving countries, but they have important consequences for migrants and their countries of origin. The chapter first provides an overview of the interrelationships between labor emigration, rights, and human development before discussing how migrant workers and their countries of origin respond to the trade-off between openness and rights in practice. Given that the human development of people is multidimensional and includes more considerations than just access to legal rights, it is not surprising to see migrant workers making “sacrifices” in some dimensions of development in exchange for advancing others.


Sign in / Sign up

Export Citation Format

Share Document