Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
Chaos-based video encryption algorithms are designed based on selective encryption method. Different...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic...
Selective encryption techniques are usually used with resource limited communication infrastructure ...
Digital video is one of the most popular multimedia data exchanged over the internet. Previous crypt...
Technological advancements in the field of multimedia have made access to information effortless. As...
The usage of Multimedia data has increased by many folds in recent years. And with so many different...
With the development of the internet and multimedia technology digital video encryption has attracte...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
Increased demand of multimedia data over heterogeneous networks has led to the requirement for incre...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
Abstract This paper proposes a video security transmission enhancement algorithm based on block perm...
This paper proposes an image encryption scheme based on chaotic maps. In this method, the dynamical...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
Chaos-based video encryption algorithms are designed based on selective encryption method. Different...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic...
Selective encryption techniques are usually used with resource limited communication infrastructure ...
Digital video is one of the most popular multimedia data exchanged over the internet. Previous crypt...
Technological advancements in the field of multimedia have made access to information effortless. As...
The usage of Multimedia data has increased by many folds in recent years. And with so many different...
With the development of the internet and multimedia technology digital video encryption has attracte...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
Increased demand of multimedia data over heterogeneous networks has led to the requirement for incre...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
Abstract This paper proposes a video security transmission enhancement algorithm based on block perm...
This paper proposes an image encryption scheme based on chaotic maps. In this method, the dynamical...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
Chaos-based video encryption algorithms are designed based on selective encryption method. Different...