CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Technical Survey based on Secure Video Transmission Techniques

Published on September 2014 by Ronak Dak, Dharm Singh, Naveen Choudhary
Recent Advances in Wireless Communication and Artificial Intelligence
Foundation of Computer Science USA
RAWCAI - Number 2
September 2014
Authors: Ronak Dak, Dharm Singh, Naveen Choudhary
66c81204-75ba-4528-914b-49cf1d42ddcc

Ronak Dak, Dharm Singh, Naveen Choudhary . A Technical Survey based on Secure Video Transmission Techniques. Recent Advances in Wireless Communication and Artificial Intelligence. RAWCAI, 2 (September 2014), 19-23.

@article{
author = { Ronak Dak, Dharm Singh, Naveen Choudhary },
title = { A Technical Survey based on Secure Video Transmission Techniques },
journal = { Recent Advances in Wireless Communication and Artificial Intelligence },
issue_date = { September 2014 },
volume = { RAWCAI },
number = { 2 },
month = { September },
year = { 2014 },
issn = 0975-8887,
pages = { 19-23 },
numpages = 5,
url = { /proceedings/rawcai/number2/17923-1422/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Recent Advances in Wireless Communication and Artificial Intelligence
%A Ronak Dak
%A Dharm Singh
%A Naveen Choudhary
%T A Technical Survey based on Secure Video Transmission Techniques
%J Recent Advances in Wireless Communication and Artificial Intelligence
%@ 0975-8887
%V RAWCAI
%N 2
%P 19-23
%D 2014
%I International Journal of Computer Applications
Abstract

With the fast expansion of a variety of multimedia technologies, further and more multimedia statistics are produced and transmitted in the fields like military, medical and for further commercial field which may have some susceptible information that is not to be supposed to be seen or accessed by or may only be shown partially to the common users. Therefore, security and privacy has turn out to be significant phase. Over the last few years numerous encryption algorithms are introduced to secure and protect the video during transmission. Along with that many efficient multimedia encryption schemes are introduced and real world is using those techniques. In this paper, various techniques are observed described showing encryption methods and video transmission techniques have been studied.

References
  1. Nikolaos Bourbakis, Apostolos Dollas "SCAN-Based Compression–Encryption–Hiding for Video on Demand" 2003 IEEE Published by the IEEE Computer Society
  2. Chao-Shen Chen, and Rong-Jian Chen "Image Encryption and Decryption Using SCAN Methodology" Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06) 2006 IEEE
  3. Meng Jian-liang Pang Hui-jing Gao Wan-qing "New color image encryption algorithm based on chaotic sequences ranking" 2008 IEEE
  4. ZHANG Yun-peng, ZHAI Zheng-jun, LIU Wei, NIE Xuan, CAO Shui-ping, DAI Wei-di "Digital Image Encryption Algorithm Based on Chaos and Improved DES" Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics
  5. M. T. Rodríguez-Sahagún, J. B. Mercado-Sánchez, D. López-Mancilla, R. Jaimes-eátegui, J. H. García-López "Image Encryption Based on Logistic Chaotic Map for Secure Communications" 2010 IEEE
  6. Zhu Yu Zhou Zhe Yang Haibing Pan Wenjie Zhang Yunpeng* "A Chaos-Based Image Encryption Algorithm Using Wavelet Transform" 2010 IEEE
  7. Guiliang Zhu Weiping Wang Xiaoqiang Zhang 2, Mengmeng Wang! "Digital Image Encryption Algorithm Based on Pixels"2010 IEEE.
  8. Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More "Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study" International Journal of Computer Applications (0975 – 8887) Volume 65– No. 1, March 2013
  9. Yong Zhang, "Encryption Speed Improvement on -An Improvement over An Image Encryption Method Based on Total Shuffling" 2013 IEEE
  10. Jitendra Rajpurohit1, Dr. Ajay Khunteta2 "A Scalable Frame Scrambling Algorithm for Video Encryption" Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013)
  11. Panduranga H. T, Naveen Kumar S. K "Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images" (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 297-300
  12. Chih-Heng Ke, Cheng-Han Lin "EVALVID - A Novel Realistic Simulation Tool for Video Transmission over Wireless Network"
  13. Yusun Chang, Chris Lee, B. Kwon, and John A. Copeland "Dynamic Optimal Fragmentation for Goodput Enhancement in WLANs"
  14. Adlen Ksentini and Mohamed Naimi "Toward an Improvement of H. 264 Video Transmission over IEEE 802. 11e through a Cross-Layer Architecture".
  15. aGonçalo Barreira "Impact of the IEEE 802. 11n Frame Aggregation Mechanisms on Video Streaming Quality".
Index Terms

Computer Science
Information Sciences

Keywords

Pattern Recognition Scan Based Patterns Security Algorithms