CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Security of Multimedia using Various Soft Computing Techniques

Published on September 2015 by Arun Kumar Bisoyi, Subhalaxmi Das, Amitav Mahapatra
International Conference on Emergent Trends in Computing and Communication
Foundation of Computer Science USA
ETCC2015 - Number 1
September 2015
Authors: Arun Kumar Bisoyi, Subhalaxmi Das, Amitav Mahapatra
65d91618-e12c-4624-95c7-67f0fb037fb1

Arun Kumar Bisoyi, Subhalaxmi Das, Amitav Mahapatra . A Survey on Security of Multimedia using Various Soft Computing Techniques. International Conference on Emergent Trends in Computing and Communication. ETCC2015, 1 (September 2015), 12-17.

@article{
author = { Arun Kumar Bisoyi, Subhalaxmi Das, Amitav Mahapatra },
title = { A Survey on Security of Multimedia using Various Soft Computing Techniques },
journal = { International Conference on Emergent Trends in Computing and Communication },
issue_date = { September 2015 },
volume = { ETCC2015 },
number = { 1 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 12-17 },
numpages = 6,
url = { /proceedings/etcc2015/number1/22330-4549/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emergent Trends in Computing and Communication
%A Arun Kumar Bisoyi
%A Subhalaxmi Das
%A Amitav Mahapatra
%T A Survey on Security of Multimedia using Various Soft Computing Techniques
%J International Conference on Emergent Trends in Computing and Communication
%@ 0975-8887
%V ETCC2015
%N 1
%P 12-17
%D 2015
%I International Journal of Computer Applications
Abstract

In the recent years, with the development of network and multimedia technology, multimedia data, especially image, audio and video data are used more and more widely in human society. In this regard, to protect multimedia contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications. This Paper, make a survey on various techniques for securities of Multimedia content using soft computing approach

References
  1. http://www. internetlivestats. com/internet-users/
  2. Reshu Choudhary and Arun Jb. "Multimedia Content Security using Image Encryption", IJCA Proceedings on National Conference on Advances in Technology and Applied Sciences NCATAS(1):30-33, September 2014.
  3. Zhaopin Su, Guofu Zhang and Jianguo Jiang ," Multimedia Security: A Survey of Chaos-Based Encryption Technology" 2012 , pp. 99-124
  4. Shiguo Lian, Jinsheng Sun, Zhongxin Li and Zhiquan Wang, "A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network", 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004. pp. 720-725, Serial Vol. 3316. Springer Berlin Heidelberg.
  5. Ismail I. A, Galal-Edeen, Khattab S and El Bahtity, "Satellite image encryption using neural networks back propagation" , 22nd International Conference on Computer Theory and Applications (ICCTA), 2012, IEEE, Alexandria, pp. 148-152.
  6. Yanling Liu, Jianxiong Zhang and Wansheng Tang, "Noise removal using Cohen-Grossberg neural network for improving the quality of the decrypted image in color encryption", IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011. Xi'an, pp. 25-29.
  7. Naoe K and Takefuji Y, "Damageless image hashing using neural network", International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2010, IEEE, Paris, pp. 442-447.
  8. E. Istook, T. Martinez, "Improved back propagation learning in neural networks with windowed momentum", International journal of neural systems, vol. 12, no. 3&4, pp. 303-318, 2002.
  9. Shyam Nandan Kumar, "Technique for Security of Multimedia using Neural Network", International Journal of Research in Engineering Technology and Management (IJRETM) , Vol. 2.
  10. http://en. wikipedia. org/wiki/Encryption
  11. McCulloch, Warren; Walter Pitts (1943). "A Logical Calculus of Ideas Immanent in Nervous Activity". Bulletin of Mathematical Biophysics 5 (4): 115–133.
  12. Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen. Handbook of Theoretical Computer Science 1. Elsevier.
  13. Taubman D. : High Performance Scalable Image Compression with EBCOT. IEEE Trans. on Image Processing. Vol. 9, No. 7 (2000) 1158-1170
  14. Joarder Kamruzzaman Monash, "Artif ficial neural networks in finance and manufacturing", Idea group publish hing, 2006, ISBN 1-59140-672-2.
  15. Khalil Shihab, "A Cryptographic Sche eme Based on Neural Networks",Proceedings of the 10th WSEAS International Conference on COMMUNICATIONS, Vouliagmeni, Athens,A Greece, July 10-12, 2006 . pp7-12
  16. Science, Enginee ering and Technology 17 2006, (pp60-64)
  17. D. Gladis and P. Thangavel, "Noise removal using hopfield neural network in message transmission systems," in Proc. 2nd UKSIM Eur. Symp. Computer Modeling Simulation, 2008, pp. 52-57.
  18. V. 1. Arnold and A. Avez, "Ergodic problems mechanics. " New York: W. A. Benjamin Inc, 1968.
  19. M. A. Cohen and S. Grossberg, "Absolute stability of global pattern formation and parallel memory storage by competitive neural networks," IEEE Trans. Syst. Man, Cybern. , vol. 13, no. 5, pp. 815-826, 1983.
  20. Costa, F. , Frasconi, P. , Lombardo, V. , and Soda, G. Towards Incremental Parsing of Natural Language using Recursive Neural Networks. Applied Intelligence, 19(1/2):9-25, 2003.
  21. Mandic, D. & Chambers, J. (2001). Recurrent Neural Networks for Prediction: Architectures, Learning algorithms and Stability. Wiley.
  22. Richard S. Sutton and Andrew G. Barto Reinforcement Learning: An Introduction. MIT Press, Cambridge, MA, 1998.
  23. P. S. Zheng, J. X. Zhang, and W. S. Tang, "Color image associative memory on a class of cohen-grossberg networks," Pattern Recognit. ,vol. 43, no. 10, pp. 3255-3260, 2010.
  24. Karras D. A. , Zorkadis V. : On Neural Network Techniques in the Secure Management of Communication Systems through Improving and Quality Assessing Pseudorandom Stream Generators. Neural Networks, Vol. 16, No. 5-6 (2003) 899-905.
  25. Chan C. K. , Cheng L. M. : Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (ISCAS'98), Vol. 3 (1998) 183–186
  26. Yen J. C. , Guo J. I. : A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proceeding of the 10th Taiwan VLSI Design/CAD Symposium. (1999) 319-322
  27. S. Anna Durai, and E. "Anna Saro, "Image Compression with Back Propagation Neural Network using Cu umulative Distribution Function", World Academy of
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Image Encryption Cohen-grossberg Neural Network Chaotic Neural Network Back Propagation Algorithm Encryption Decryption Neural Network.