4 research outputs found

    Survey of Video Encryption Algorithms

    Get PDF
    Research on security of digital video transmission and storage has been gaining attention from researchers in recent times because of its usage in various applications and transmission of sensitive information through the internet. This is as a result of the swift development in efficient video compression techniques and internet technologies. Encryption which is the widely used technique in securing video communication and storage secures video data in compressed formats. This paper presents a survey of some existing video encryption techniques with an explanation on the concept of video compression. The review which also explored the performance metrics used in the evaluation and comparison of the performance of video encryption algorithms is being believed to give readers a quick summary of some of the available encryption techniques

    Color Image Encryption Algorithm Based on TD-ERCS System and Wavelet Neural Network

    Get PDF
    In order to solve the security problem of transmission image across public networks, a new image encryption algorithm based on TD-ERCS system and wavelet neural network is proposed in this paper. According to the permutation process and the binary XOR operation from the chaotic series by producing TD-ERCS system and wavelet neural network, it can achieve image encryption. This encryption algorithm is a reversible algorithm, and it can achieve original image in the rule inverse process of encryption algorithm. Finally, through computer simulation, the experiment results show that the new chaotic encryption algorithm based on TD-ERCS system and wavelet neural network is valid and has higher security

    Buyer-seller watermarking protocol in digital cinema

    Get PDF
    Master'sMASTER OF SCIENC

    A new chaotic algorithm for video encryption

    No full text
    We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic functions, allows to increase the security level while maintaining acceptable processing times. We analyze the performance of the new scheme either though simulation or via practical implementation, thus demonstrating its efficiency, also in comparison with previous proposals
    corecore