2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies 2011
DOI: 10.1109/icsccn.2011.6024585
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Encryption schemes of video for real time applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…This encryption method involves the selection of some sensitive areas by the users, and thus is not suitable for cross-user deduplication in the cloud. In [76], the video is converted into Discrete Cosine Transformation (DCT) coefficients, then these coefficients are encrypted using a secret sharing method. The use of secret sharing ensures that there is no combination of the members of a group that can discover the secret.…”
Section: Svds-h264 Schemementioning
confidence: 99%
“…This encryption method involves the selection of some sensitive areas by the users, and thus is not suitable for cross-user deduplication in the cloud. In [76], the video is converted into Discrete Cosine Transformation (DCT) coefficients, then these coefficients are encrypted using a secret sharing method. The use of secret sharing ensures that there is no combination of the members of a group that can discover the secret.…”
Section: Svds-h264 Schemementioning
confidence: 99%
“…In this publication (7), the authors of varalaxmi.l developed a new encryption method for the transmission of real-time videotapes. The primary component of the plan is for videos to be transformed into DCT measure and then translated through the use of secret sharing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This encryption method involves the selection of some sensitive areas by the users, and thus is not suitable for cross-user deduplication in the cloud. In [25], the video is converted into Discrete Cosine Transformation (DCT) coefficients, then these coefficients are encrypted using a secret sharing method. The use of secret sharing ensures that there is no combination of the members of a group that can discover the secret.…”
Section: Related Workmentioning
confidence: 99%