video security
Recently Published Documents


TOTAL DOCUMENTS

54
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
pp. 672-680
Author(s):  
Vladimir Polyakov ◽  
Aleksandr Mezhenin ◽  
Vladimir Vereskun ◽  
Anatoly Korobeynikov ◽  
Vasilii Shapovalov


2021 ◽  
Vol 9 (1) ◽  
pp. 1195-1199
Author(s):  
Tushar Rohilla, Manoj Kumar, Rajeev Kumar

This paper provides the conceptual framework on image watermarking which is widely used for security purpose within the epoch of data and Communication Technology. Image watermarking is predicated on the concept that the signal may carry several different watermarks at the identical time. The signal is also audio, pictures or video. Security issue in watermarking is because of enlargement of internet within the present paper the primary phase detailed description of watermarking has been on condition that data set are prepared on which watermarking technique are executed. In the second phase detailed working of the various techniques of image watermarking have to locate a selected watermarking technique which is able to provide appropriate ends up in term of PSNR and interval and various attacks are tested on images so implemented method must stand against various attacks. In final phase reverse process are executed to extract host and watermark image. There are many viable attacks. Spotting is an algorithm which is applied to the attacked signal to infusion the watermark from it. During the research work our main focus will be to enhance various critical paramters like PSNR and execution time so that better outcome can be attained.



2020 ◽  
Vol 10 (2) ◽  
pp. 95
Author(s):  
Rivalri Kristianto Hondro

ABSTRACT The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos. Paying attention to the security side of the video aims to ensure that the information contained in the video cannot be accessed by people who are not interested. Besides, the security side that must be ensured is maintaining the authentication of data to avoid manipulation actions carried out by people who are not responsible. One of the video security techniques that can ensure the authenticity or authenticity of a video is cryptographic techniques. One cryptographic algorithm that can ensure the authentication of the video is the message digest 5 algorithm. The results obtained from the application of message digest 5 are hash codes that can be used as the values of meters to express the authenticity of the video metadata identity. Keyword: Authentication, Cryptography, Message Digest 5 Algorithm, Video   Abstrak Pemanfaatan dokumen video sebagai salah satu media untuk menyampaikan informasi sangat banyak digunakan saat ini. Dimana terbukti dibeberapa aplikasi jejaringan sosial banyak memuat konten tentang informasi dalam bentuk video. Memperhatikan sisi keamanan dari video bertujuan untuk memastikan informasi yang ada pada video tidak dapat diakses oleh orang yang tidak berkepentingan. Selain itu juga sisi keamanan yang harus dipastikan adalah menjaga otentikasi dari sebuah data untuk menghindari tindakan-tindakan manipulasi yang dilakukan oleh orang yang tidak bertanggung jawab. Salah satu teknik keamanan video yang dapat memastikan otentikasi atau keaslian dari sebuah video adalah teknik kriptografi. Salah satu algoritma kriptgrafi yang mampu memastikan otentikasi dari pada video adalah algoritma message digest 5. Hasil yang didapatkan dari penerapan message digest 5 adalah kode hash yang dapat dijadikan sebagai nilai para meter untuk menyatakan keaslian dari identitas meta data file video. Kata Kunci: Otentikasi, Kriptografi, Algoritma Message Digest 5, Video



Security is imperative to individuals' key opportunity. In the course of recent decades with the headway of correspondence innovation the utilization of web has developed amazingly to trade data with no separation bearer. The most recent drama covers the threats against our technology infrastructures. The most challenging issue in the military network is that secure retrieval of confidential data. Information installing is the way toward implanting data in an information source without changing its perceptual quality. Stenography is the method of thrashing a document, message, picture or video surrounded by another record, message, picture or video. In previous methods, usage of image and text as key produces low security and reversible data hiding as algorithm produces less compression ratio. In our paper we proposed a novel method for increasing the video security by using One Time Password (OTP) and voice key as password and improving compression rate by using Blind detection algorithm. The uses of blind detection algorithm includes greater computational accuracy, high flexibility and deliver faster execution by an estimated high PSNR value .In addition, this paper also includes compressing image, audio and video files and embedding into a single video.



2020 ◽  
Vol 4 (2) ◽  
pp. 340
Author(s):  
Supiyandi Supiyandi ◽  
Hermansyah Hermansyah ◽  
Khairani A P Sembiring

Personal data is often the target of people who are not responsible for being misused. Theft is done is to benefit from people who have the data. In addition to theft of work files, theft is also carried out on video files. Theft of this file aims to find out what the contents of the video. Someone has a private recorded video that cannot be known by others. Misuse of video files will be fatal for the owner of the video. Cryptographic techniques are needed in video security. Caesar Cipher's algorithm can help users secure the video file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store in a storage medium. This algorithm will make the file structure simpler so that it can be displayed and saved. By applying the Base64 and Caesar Cipher algorithms to video files, the security and confidentiality of these files will be guaranteed



2020 ◽  
Vol 23 (2) ◽  
pp. 349-363
Author(s):  
Lastika Sethi ◽  
Anay Dave ◽  
Raj Bhagwani ◽  
Ameyaa Biwalkar
Keyword(s):  


Author(s):  
Mohamed TajElsir Awad ◽  
Sally Mohamed Aldaw ◽  
Salma Mohamed Aldaw ◽  
Babekir A. rahman Osman


Sign in / Sign up

Export Citation Format

Share Document