Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Survey on Video Encryption Techniques


Affiliations
1 B.C.I.I.T, Delhi, India
     

   Subscribe/Renew Journal


Various video encryption techniques are proposed to encrypt the videos and used for obtaining highly encrypted videos.

The paper focuses on different existing methods for video techniques. It focuses on the full or selective encryption techniques & various schemes under it. This survey provides information about the existing methods and their improvements, hence providing a platform for new researchers for innovating new Techniques for further research.


Keywords

Deformation & Formation Algorithm, I-frames, Chaos, VEA
Subscription Login to verify subscription
User
Notifications
Font Size


  • M. Abomhara, Omar Zakaria, Othman O. Khalifa “An Overview of Video Encryption Techniques”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 1793-8201.
  • Jolly shah and Dr. Vikas Saxena,” Video Encryption: A Survey”, International Journal of Recent Trends in Engineering, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011 ISSN (Online): 1694-0814.
  • Amit Pande, Prasant Mohapatra, Joseph Zambreno,” Using Chaotic Maps for Encrypting Image and Video Content”, 2011 IEEE International Symposium on Multimedia.
  • Sufyan T. Faraj Al-Janabi, Khalida Shaaban Rijab, Ali Makki Sagheer,” Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher”, 2011 Developments in E-systems Engineering.
  • Mayank Arya Chandra, Dr. Ravindra Purwar, Dr. Navin Rajpal, ”A Novel Approach of Digital Video Encryption”, International Journal of Computer Applications (0975 - 8887) Volume 49-No.4, July 2012.
  • M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, ”A Modified AES Based for Image Encryption”, World Academy of Science, Engineering and Technology 3 2007.
  • Fadi Almasalha, Ashfaq Khokkar, Rogelio Hasimoto beltran, ”Scalable Encryption of variable ength Coded video Bit Streams”, 35th Annual IEEE conference on Local Com.
  • Daniel Soek, Hari Kalva, Syyros S. Magliveras,” New Approaches to encryption and steganography for digital videos”, Multimedia Systems, 01 1007/s00530-007-0083-,@Springer-Verlag 2007.
  • Knuth, D.E.: The art of computer programming, 2nd edn., vol. 3: Sorting and Searching, pp. 113-122. Addison-Wesley, Reading, MA (1998).
  • S., Chen, G., Zheng, X.: Multimedia security handbook. Internet and Communications Series, vol. 4, chap. Chaos-Based Encryption for Digital Images and Videos, pp. 133–167. CRC Press, West Palm Beach (2004).
  • X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the Second IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), pp. 527-533. Scottsdale, AZ, USA, IASTED, 17-19 November 2003.
  • ISCAS 2004. 2004. 3. Guosheng Gu, g.H. The application of chaos and DWT in image scrambling. in Proceeding of the Fifith Interational Conference on Machine Learning and Cybernetics. 2006.
  • Dalian S. Agaian, J.A., K. Egiazarian, P. Kuosmanen, Decompositional methods for stack filtering using Fibonacci pcodes. Signal Processing, 1995.
  • David. Gevorkian, K.O.E., Sos S. Agaian, Parallel Algorithms and VLSI Architectures for Stack Filtering Using Fibonacci p-Codes. IEEE Transactions on Signal Processing, 1995.. 286-295.
  • Tzouveli Paasikivi, Ntalianis Klimis, Kollias Stefanos “Security of Human Video Objects by Incorporating a Chaos-Based Feedback Cryptographic Scheme”.
  • MPEG. (1988). The MPEG Home Page. Retrieved Jan 13, 2009, from http://www.chiariglione.org/mpeg/

Abstract Views: 481

PDF Views: 0




  • A Survey on Video Encryption Techniques

Abstract Views: 481  |  PDF Views: 0

Authors

Yogita Negi
B.C.I.I.T, Delhi, India

Abstract


Various video encryption techniques are proposed to encrypt the videos and used for obtaining highly encrypted videos.

The paper focuses on different existing methods for video techniques. It focuses on the full or selective encryption techniques & various schemes under it. This survey provides information about the existing methods and their improvements, hence providing a platform for new researchers for innovating new Techniques for further research.


Keywords


Deformation & Formation Algorithm, I-frames, Chaos, VEA

References