scholarly journals By Practicing the Satisfied Reconnaissance and Speculative Research on the Substantiated Broadcast Transportation

2019 ◽  
Vol 8 (4) ◽  
pp. 12977-12980

Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The research displays a computationally capable and secure video encryption approach with the usage of appropriated and parallel condition. The research expects to make secure video transformation practical for constant applications with no additional committed equipment at the recipient side. Checking is a significant testing task particularly as for the assertion of security, affirmation, and uprightness. The mixed media has been a detour to transmit which aides of inserting in OBS to furnish a safe route with lower rate buffering. The wide usage of a correspondence using the Internet has energized the sharing of mixed media source records posts in a less troublesome manner. A standard encryption count is especially material for content and twofold data yet fails to manage voluminous video data. Subsequently, this control has been giving a safe path transmission without gatecrasher which supports the HD information. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without tradeoff in the nature of the video.

Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The paper displays a computationally capable and secure video encryption approach with usage of appropriated and parallel condition. The paper expects to make secure video encryption practical for constant applications with no additional committed equipment at recipient side. Verifying is a major testing assignment especially with respect to affirmation of privacy, confirmation and uprightness. Writing indicates utilization of cryptography and steganography to verify distinctive types of computerized information. The wide utilization of correspondence utilizing Internet has encouraged sharing of content as well as sound and video posts in a less difficult way. A standard encryption calculation is particularly material for content and twofold information yet neglects to deal with voluminous video information. An endeavor has been made in the paper to verify recordings utilizing keyed hash calculations. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without trade off in nature of the video.


2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2012 ◽  
Vol 2012 ◽  
pp. 1-3 ◽  
Author(s):  
Per Egil Kummervold ◽  
Rolf Wynn

The aim of this study was to summarize and analyse findings from four prior studies on the use of the Internet as a source of health information in five European countries (Norway, Denmark, Germany, Greece, and Portugal). A cross-study comparison of data was performed. All the studies included fit with a trend of a sharp and continuous growth in the use of the Internet for health information access in the major part of the last decade. Importantly, the Internet has become an important mass media source of health information in northern Europe. While the use of the Internet for health information is somewhat less common in the south European countries, its use is also clearly increasing there. We discuss the advantages of cross-study comparisons of data and methodological challenges. As the use of the Internet for health information is likely to peak in some countries in the near future, new population surveys on health information access should focus more on the details of information that is accessed and which sites that are most used and trusted.


2021 ◽  
Vol 18 (6) ◽  
pp. 9410-9429
Author(s):  
Qing Ye ◽  
◽  
Qiaojia Zhang ◽  
Sijie Liu ◽  
Kaiqiang Chen ◽  
...  

<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved on the basis of the ICMIC system and combined with CML, generates stream ciphers and encrypts some syntax elements of HEVC. The experimental results show that the stream cipher generated by the L-ICMIC-CML system passes the SP800-22 Revla test and has strong randomness. Applying the stream cipher to the proposed HEVC encryption scheme, through the analysis of the encryption scheme's security, encryption time and encryption efficiency, it is better than other chaotic system encryption schemes. The video encryption system proposed in this paper is both safe and efficient.</p> </abstract>


2013 ◽  
Vol 765-767 ◽  
pp. 615-619
Author(s):  
Xue Yan Zhang ◽  
Hu Chao Deng ◽  
Liang Wei Chen

To meet the requirement of multimedia video transmission's safety and real-time, this paper provides a conclusion based on video encryption schemes of the encryption algorithm. The solution sorts video data into VLC(variable length code) and FLC(fix-length code) ,only choose to reconstruction images FLC compared to encrypt the important element of the operation. The analysis and the simulation results show that the encryption scheme is not only high safety but also low cost system.


Author(s):  
Trevor Bopp ◽  
Joshua D. Vadeboncoeur ◽  
Michael Stellefson ◽  
Melissa Weinsz

The Internet, and particularly YouTube, has been found to be and continues to develop as a resourceful educational space for health-related information. Understanding physical literacy as a lifelong health-related outcome and facilitator of an active lifestyle, we sought to assess the content, exposure, engagement, and information quality of uploaded physical literacy videos on YouTube. Two researchers collected 300 YouTube videos on physical literacy and independently coded each video’s: title, media source of upload, content topics related to physical literacy, content delivery style, and adherence to adapted Health on the Net Foundation Code of Conduct (HONcode) principles of information quality. Physical literacy videos that focused on physical activity and behaviors were the strongest predictor of high quality ratings, followed closely by videos covering affective domains (motivation, confidence, and self-esteem) of physical literacy. The content delivery method was also important, with videos utilizing presentations and testimonials containing high quality information about physical activity. Thus, providers of physical literacy and health-related online video content should be aware of and adhere to the expected quality standards. As health information expectations and ethical standards increase, the Internet, and specifically YouTube, has the potential to enhance video resources, virtual networking opportunities, as well as the sharing, dissemination, accumulation, and enrichment of physical literacy information for all.


2013 ◽  
Vol 791-793 ◽  
pp. 1497-1500
Author(s):  
Jin Hui Zhao ◽  
Xiao Hong Wang

On the Internet, most of media information is transmitted in plaintext. Some others can easily tamper or intercut the information, so there are threats to those information transmitted in plaintext. This paper designs a model of video encryption which uses AES algorithm and the model is based on FPGA platform. The model does the encryption in paralleling on XUPV5-110T development board. The encryption model can ensure the security and integrity of media information during the transmission process between a certain links on the network.


2014 ◽  
Vol 11 (6) ◽  
pp. 1111-1119 ◽  
Author(s):  
MeLisa Creamer ◽  
Heather R. Bowles ◽  
Belinda von Hofe ◽  
Kelley Pettee Gabriel ◽  
Harold W. Kohl ◽  
...  

Background:Computer-assisted techniques may be a useful way to enhance physical activity surveillance and increase accuracy of reported behaviors.Purpose:Evaluate the reliability and validity of a physical activity (PA) self-report instrument administered by telephone and internet.Methods:The telephone-administered Active Australia Survey was adapted into 2 forms for internet self-administration: survey questions only (internet-text) and with videos demonstrating intensity (internet-video). Data were collected from 158 adults (20–69 years, 61% female) assigned to telephone (telephone-interview) (n = 56), internet-text (n = 51), or internet-video (n = 51). Participants wore an accelerometer and completed a logbook for 7 days. Test-retest reliability was assessed using intraclass correlation coefficients (ICC). Convergent validity was assessed using Spearman correlations.Results:Strong test-retest reliability was observed for PA variables in the internet-text (ICC = 0.69 to 0.88), internet-video (ICC = 0.66 to 0.79), and telephone-interview (ICC = 0.69 to 0.92) groups (P-values < 0.001). For total PA, correlations (ρ) between the survey and Actigraph+logbook were ρ = 0.47 for the internet-text group, ρ = 0.57 for the internet-video group, and ρ = 0.65 for the telephone-interview group. For vigorous-intensity activity, the correlations between the survey and Actigraph+logbook were 0.52 for internet-text, 0.57 for internet-video, and 0.65 for telephone-interview (P < .05).Conclusions:Internet-video of the survey had similar test-retest reliability and convergent validity when compared with the telephone-interview, and should continue to be developed.


Sign in / Sign up

Export Citation Format

Share Document