Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Survey on Security of Multimedia using Various Soft Computing Techniques

IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication
© 2015 by IJCA Journal
ETCC 2015 - Number 1
Year of Publication: 2015
Arun Kumar Bisoyi
Subhalaxmi Das
Amitav Mahapatra

Arun Kumar Bisoyi, Subhalaxmi Das and Amitav Mahapatra. Article: A Survey on Security of Multimedia using Various Soft Computing Techniques. IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication ETCC 2015(1):12-17, September 2015. Full text available. BibTeX

	author = {Arun Kumar Bisoyi and Subhalaxmi Das and Amitav Mahapatra},
	title = {Article: A Survey on Security of Multimedia using Various Soft Computing Techniques},
	journal = {IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication},
	year = {2015},
	volume = {ETCC 2015},
	number = {1},
	pages = {12-17},
	month = {September},
	note = {Full text available}


In the recent years, with the development of network and multimedia technology, multimedia data, especially image, audio and video data are used more and more widely in human society. In this regard, to protect multimedia contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications. This Paper, make a survey on various techniques for securities of Multimedia content using soft computing approach


  • http://www. internetlivestats. com/internet-users/
  • Reshu Choudhary and Arun Jb. "Multimedia Content Security using Image Encryption", IJCA Proceedings on National Conference on Advances in Technology and Applied Sciences NCATAS(1):30-33, September 2014.
  • Zhaopin Su, Guofu Zhang and Jianguo Jiang ," Multimedia Security: A Survey of Chaos-Based Encryption Technology" 2012 , pp. 99-124
  • Shiguo Lian, Jinsheng Sun, Zhongxin Li and Zhiquan Wang, "A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network", 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004. pp. 720-725, Serial Vol. 3316. Springer Berlin Heidelberg.
  • Ismail I. A, Galal-Edeen, Khattab S and El Bahtity, "Satellite image encryption using neural networks back propagation" , 22nd International Conference on Computer Theory and Applications (ICCTA), 2012, IEEE, Alexandria, pp. 148-152.
  • Yanling Liu, Jianxiong Zhang and Wansheng Tang, "Noise removal using Cohen-Grossberg neural network for improving the quality of the decrypted image in color encryption", IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011. Xi'an, pp. 25-29.
  • Naoe K and Takefuji Y, "Damageless image hashing using neural network", International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2010, IEEE, Paris, pp. 442-447.
  • E. Istook, T. Martinez, "Improved back propagation learning in neural networks with windowed momentum", International journal of neural systems, vol. 12, no. 3&4, pp. 303-318, 2002.
  • Shyam Nandan Kumar, "Technique for Security of Multimedia using Neural Network", International Journal of Research in Engineering Technology and Management (IJRETM) , Vol. 2.
  • http://en. wikipedia. org/wiki/Encryption
  • McCulloch, Warren; Walter Pitts (1943). "A Logical Calculus of Ideas Immanent in Nervous Activity". Bulletin of Mathematical Biophysics 5 (4): 115–133.
  • Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen. Handbook of Theoretical Computer Science 1. Elsevier.
  • Taubman D. : High Performance Scalable Image Compression with EBCOT. IEEE Trans. on Image Processing. Vol. 9, No. 7 (2000) 1158-1170
  • Joarder Kamruzzaman Monash, "Artif ficial neural networks in finance and manufacturing", Idea group publish hing, 2006, ISBN 1-59140-672-2.
  • Khalil Shihab, "A Cryptographic Sche eme Based on Neural Networks",Proceedings of the 10th WSEAS International Conference on COMMUNICATIONS, Vouliagmeni, Athens,A Greece, July 10-12, 2006 . pp7-12
  • Science, Enginee ering and Technology 17 2006, (pp60-64)
  • D. Gladis and P. Thangavel, "Noise removal using hopfield neural network in message transmission systems," in Proc. 2nd UKSIM Eur. Symp. Computer Modeling Simulation, 2008, pp. 52-57.
  • V. 1. Arnold and A. Avez, "Ergodic problems mechanics. " New York: W. A. Benjamin Inc, 1968.
  • M. A. Cohen and S. Grossberg, "Absolute stability of global pattern formation and parallel memory storage by competitive neural networks," IEEE Trans. Syst. Man, Cybern. , vol. 13, no. 5, pp. 815-826, 1983.
  • Costa, F. , Frasconi, P. , Lombardo, V. , and Soda, G. Towards Incremental Parsing of Natural Language using Recursive Neural Networks. Applied Intelligence, 19(1/2):9-25, 2003.
  • Mandic, D. & Chambers, J. (2001). Recurrent Neural Networks for Prediction: Architectures, Learning algorithms and Stability. Wiley.
  • Richard S. Sutton and Andrew G. Barto Reinforcement Learning: An Introduction. MIT Press, Cambridge, MA, 1998.
  • P. S. Zheng, J. X. Zhang, and W. S. Tang, "Color image associative memory on a class of cohen-grossberg networks," Pattern Recognit. ,vol. 43, no. 10, pp. 3255-3260, 2010.
  • Karras D. A. , Zorkadis V. : On Neural Network Techniques in the Secure Management of Communication Systems through Improving and Quality Assessing Pseudorandom Stream Generators. Neural Networks, Vol. 16, No. 5-6 (2003) 899-905.
  • Chan C. K. , Cheng L. M. : Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (ISCAS'98), Vol. 3 (1998) 183–186
  • Yen J. C. , Guo J. I. : A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proceeding of the 10th Taiwan VLSI Design/CAD Symposium. (1999) 319-322
  • S. Anna Durai, and E. "Anna Saro, "Image Compression with Back Propagation Neural Network using Cu umulative Distribution Function", World Academy of