PERFORMANCE ANALYSIS OF ENHANCED VIDEO ENCRYPTION ALGORITHM

2020 ◽  
Vol 5 (2) ◽  
pp. 67-75
Author(s):  
A.A. Adenowo ◽  
L.F. Oderinu

The prevalence of internet, as well as low-cost mobile computing devices, makes video the preferred option for information archival and transmission. Also, the geometric growth in the generation and use of digital videos is massive and challenging to determine. Meanwhile, this growth has come with security and privacy issues such as unauthorized access, piracy, hacking and other digital attack every year. Restricting unauthorized access measure can be adopted to protect multimedia information, but does not guarantee the physical security of information. Cryptography which is a better and more secure approach is therefore required. Thus, this paper presents performance evaluation of Enhanced Novel Selective Video Encryption Algorithm, an AES-based video encryption algorithm. Properties of I frame are used randomly to generate the encryption key and a jump factor is used to determine which of the remaining P and B frame is selected for encryption. The results show that the more frames selected for encryption/decryption, the higher the encryption/decryption time and the higher the encrypted video size. Also, the PSNR value of this algorithm is around 40dB which indicates that the quality of the decrypted video is as high as that of the original video. The performance of this algorithm does not diminish with increase in size of video and number of frames. Hence, this algorithm is scalable, fast and highly secure for video encryption.

2013 ◽  
Vol 765-767 ◽  
pp. 615-619
Author(s):  
Xue Yan Zhang ◽  
Hu Chao Deng ◽  
Liang Wei Chen

To meet the requirement of multimedia video transmission's safety and real-time, this paper provides a conclusion based on video encryption schemes of the encryption algorithm. The solution sorts video data into VLC(variable length code) and FLC(fix-length code) ,only choose to reconstruction images FLC compared to encrypt the important element of the operation. The analysis and the simulation results show that the encryption scheme is not only high safety but also low cost system.


2021 ◽  
Vol 39 (1B) ◽  
pp. 184-196
Author(s):  
Attaa R. Alawi ◽  
Nidaa F. Hassan

Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed time, thus to speed up this process, feature detection operator (FAST) is used to encrypt key points result from FAST operator, in addition key points from this is increased to optimized between speed and robustness of proposed algorithm. In evaluation process, some of measuring quality factors MSE, PSNR, Correlation, NPCR, UACI and entropy are specified for evaluating and comparing between two suggested encryption algorithms which gave good result in encryption process (ChaCha and ChaCha with FAST Enhancement). Experimental results have discovered that the current projected has less encrypting time and better encrypting influence.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2768
Author(s):  
Domonkos Varga

No-reference video quality assessment (NR-VQA) has piqued the scientific community’s interest throughout the last few decades, owing to its importance in human-centered interfaces. The goal of NR-VQA is to predict the perceptual quality of digital videos without any information about their distortion-free counterparts. Over the past few decades, NR-VQA has become a very popular research topic due to the spread of multimedia content and video databases. For successful video quality evaluation, creating an effective video representation from the original video is a crucial step. In this paper, we propose a powerful feature vector for NR-VQA inspired by Benford’s law. Specifically, it is demonstrated that first-digit distributions extracted from different transform domains of the video volume data are quality-aware features and can be effectively mapped onto perceptual quality scores. Extensive experiments were carried out on two large, authentically distorted VQA benchmark databases.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 269 ◽  
Author(s):  
Radhika Rani Chintala ◽  
Narasinga Rao M R ◽  
Somu Venkateswarlu

Human Sensor Network (HSN) is an emerging technology that allows to remotely monitor, gather and maintain the information of patient’s health parameters using bio-sensors. The bio-sensors are either implantable or wearable or may be stitched on the clothes of a patient.The collected health information is processed and maintained in a database server. The information from the database can be accessed by the users such as doctors, health servants, government, insurance agencies and by the patient or his relatives. Since, the information collected is related to thepatient’s private health record, it is required to be safely stored and protected from an unauthorized access. Thus, Security and Privacy are the key issues in HSNs.In this paper, the infrastructure-based and adhoc-based communication architecture of HSN and challenges and measures of security and privacy issues have been reviewed.  


2013 ◽  
Vol 20 (3) ◽  
pp. 91-106 ◽  
Author(s):  
Rachel Pizarek ◽  
Valeriy Shafiro ◽  
Patricia McCarthy

Computerized auditory training (CAT) is a convenient, low-cost approach to improving communication of individuals with hearing loss or other communicative disorders. A number of CAT programs are being marketed to patients and audiologists. The present literature review is an examination of evidence for the effectiveness of CAT in improving speech perception in adults with hearing impairments. Six current CAT programs, used in 9 published studies, were reviewed. In all 9 studies, some benefit of CAT for speech perception was demonstrated. Although these results are encouraging, the overall quality of available evidence remains low, and many programs currently on the market have not yet been evaluated. Thus, caution is needed when selecting CAT programs for specific patients. It is hoped that future researchers will (a) examine a greater number of CAT programs using more rigorous experimental designs, (b) determine which program features and training regimens are most effective, and (c) indicate which patients may benefit from CAT the most.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
T. N. Antipova ◽  
D. S. Shiroyan

The system of indicators of quality of carbon-carbon composite material and technological operations of its production is proved in the work. As a result of the experimental studies, with respect to the existing laboratory equipment, the optimal number of cycles of saturation of the reinforcing frame with a carbon matrix is determined. It was found that to obtain a carbon-carbon composite material with a low cost and the required quality indicators, it is necessary to introduce additional parameters of the pitch melt at the impregnation stage.


Sign in / Sign up

Export Citation Format

Share Document