multimedia file
Recently Published Documents


TOTAL DOCUMENTS

94
(FIVE YEARS 13)

H-INDEX

7
(FIVE YEARS 1)

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Watermarking is the process of embedding specific data to prove ownership copyright authentication. It is needed whenever media-files are used without proper permission is granted. The current watermarking challenge comes from the ownership proof especially as slight tampering occurs on the multimedia-file which injure the watermarking causing difficulty in its copyright proof. This paper proposes utilizing counting-based secret sharing strategy to allow validation of ownership RGB watermarking even if some of the image-file is interfered. We validate image watermarking partially as lightweight semi-complete verification, which is not possible in the normal random-stream watermarking schemes. Although the work is still in its early stage, it is promising research showing real attractive contribution opportunities. The work is tested and compared to other strategies in aspects of robustness, capacity, and security, providing attractive remarks worth noting. The study evaluation results showed interesting contribution believed to be pioneering.


Author(s):  
Neelanjan Manna

Abstract: Nowadays we use text passwords to encrypt a file. This research paper proposes to use multimedia files like images videos, audio files and even applications as the password key to encrypt sensitive information. This algorithm can encrypt bulk data as well as single data sets. Keywords: steganography, multimedia file as key, Quantum computer, cryptography, Quantum computer proof encryption.


2021 ◽  
Vol 13 (5) ◽  
pp. 101-113
Author(s):  
Rupa Ch. ◽  
Sumaiya Shaikh ◽  
Mukesh Chinta

In current days, there is a constant evolution in modern technology. The most predominant usage of technology by society is the internet. There are many ways and means on the internet through which data is transmitted. Having such rapid and fast growth of communicating media also increases the exposure to security threats, causing unintellectual information ingress. Steganography is the main aspect of communicating in an aspect that hides the extent of communication. Steganalysis is another essential concern in data concealing, which is the art of identifying the existence of steganography. A framework has been designed to identify the concealed data in the multimedia file in the proposed system. This work's main strength is analyzing concealed data images without embedding and extracting the image's payloads. A quantitative steganalysis approach was considered to accomplish the proposed objective. By using this approach, the results were achieved with 98% accuracy.


2021 ◽  
Vol 4 (4) ◽  
pp. 738
Author(s):  
Desy Rachmiati ◽  
Imam Qalyubi ◽  
Zaitun Qamariah

A podcast is a digital multimedia file that can be downloaded to a portable media player, phone, or other device via the internet. There are many audio podcast that can be used in learning listening, one of them is British Broadcasting Corporation (BBC) podcast. This research aimed to describe how the contribution and the problems in using British Broadcasting Corporation (BBC) podcast in EFL students’ listening skill. This research was conducted at IAIN Palangka Raya. The type of this study was a qualitative approach. The data was taken from interview and documentation. Eight EFL students and two lecturers in IAIN Palangka Raya were the subjects of this research. They were determined by purposive sampling technique. The findings reveal that the use of British Broadcasting Corporation (BBC) podcast give positive contribution to students’ listening skill. Based on the result of the research using British Broadcasting Corporation (BBC) podcast can develop students’ listening skill, vocabularies and they will be familiar with British accent. The problems in using the BBC podcast faced by the students were unfamiliar pronunciation, lack of vocabularies, and the speaker who spoke fast. Keywords:  Podcast, British Broadcasting Corporation (BBC) podcast, EFL students, listening skill


Author(s):  
Shshank Sourabh ◽  
Diwakar Chauhan ◽  
Vinay Singh ◽  
Monika Chauhan

Objective: The use of smartphones has exponentially increased over the past decade. Nowadays the use of a cellphone has not just been restricted to make calls, but it's also actively used to connect people throughout the globe through social media and sharing multimedia files over the internet. Smartphones have made these things possible and easily available with just a single touch. But along with this development and digitalization, an increase in the rate of cybercrime has also surfaced, which includes crime like illicit possession, distribution, and modification of multimedia files. Hence, smartphones are seen as a rich source of evidence-based on the crimes discussed. This process is carried out to analyze smartphone‟s multimedia files to determine their origin and to verify if the multimedia files originated from the same device or transferred through any process. Methods: An examiner must analyze, recover, and authenticate the files stored in a smartphone device. Android version 9 was used for analysis since it is the most common and abundant platform generally found in most people‟s phones. Examination of computer file is achieved by analyzing the file in hexadecimal editor software, the software used in this analysis is HxD. Results: File signature and metadata analysis of smartphones‟ multimedia files was performed to render the source of the files. Conclusion: The conducted file signature and metadata analysis clearly stated that by using hexadecimal editor softwareHxD origin and source of smartphones‟ multimedia file can be rendered.


This article prepared with three main objectives, first it is to review the large size of multimedia file protection, second for ownership identification of the multimedia content and finally for implementing this setup for cloud based setup instead of web based service architecture. Therefore many of the infrastructure developed for multimedia content to enable the security against the file handling services for managing the better ownership identification. On private and/or public clouds, the device can be deployed. Our framework has two new components: (i) method of producing 3-D image signatures, and (ii) distributed multimedia object matching engine. The signature method produces stable and accurate 3-D video signatures capturing the depth signals in those videos as well as computationally efficient processing and comparison and having limited space. The corresponding distributed engine is highly scalable and designed to support different multimedia objects. We have introduced and deployed the proposed system on two clouds such as private and amazon based clouds.


2020 ◽  
Author(s):  
Lasarus Pelipus Malese

Perkembangan media digital yang pesat dan penggunaannya yang meliputi berbagai bidang menimbulkan tuntutan yang semakin besar untuk menciptakan suatu sistem penyampaian informasi yang terjamin keamanannya. Salah satunya adalah dengan steganografi. Steganografi merupakan suatu metode untuk menyisipkan potongan informasi rahasia dalam suatu objek atau media lain. Dengan steganografi, informasi disembunyikan sedemikian rupa sehingga tidak diketahui keberadaannya, yang dikenal dengan istilah informasi hiding. Metode ini berbeda dengan metode kriptografi, yang menyandikan informasi yang ada sehingga tidak dapat dibaca tanpa mengetahui kunci atau sandi yang digunakan, namun keberadaannya tetap diketahui dan tidak disembunyikan.Proyek akhir ini dikembangkan dengan menggunakan Microsoft Visual Basic 6.0 mengimplementasikan metode steganografi Simple Least Significant Bit Substitution ("simple LSB subtitution") untuk menyembunyikan suatu informasi ke dalam file multimedia. File multimedia yang digunakan adalah file citra, file audio, serta file video sebagai media pembawa informasi rahasia. Penggunaan teknologi steganografi ini diharapkan dapat meningkatkan keamanan dalam penyampaian informasi, agar informasi-informasi penting akan terlindungi dan tersamarkan keberadaannya dalam file multimedia. Hal ini juga diharapkan dapat membantu proses perlindungan atas hak cipta hasil karya media elektronik.


Telecom IT ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 85-95
Author(s):  
V. Zelenov ◽  
I. Shustov ◽  
R. Kirichek ◽  
A. Borodin

Research subject. The article is devoted to the method of identification of multimedia content based on digital object architecture and a stand which demonstrates the work of the method. Method. The principle of identification data division and injecting data parts in random order to a different area of the file is considered. The analysis of existing solutions is performed. Core results. Stand for identification of multimedia content based on digital object architecture have been developed. This stand can write identifier to the multimedia file and read from it. Practical relevance. The developed stand for identification of multimedia content based on digital object architecture can be used to protect digital content from piracy.


2019 ◽  
Vol 78 (23) ◽  
pp. 33837-33863 ◽  
Author(s):  
Nithya Chidambaram ◽  
Pethuru Raj ◽  
K. Thenmozhi ◽  
Sundararaman Rajagopalan ◽  
Rengarajan Amirtharajan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document