ENHANCEMENT OF MULTIMEDIA SECURITY IN CLOUD COMPUTING
Keywords:
frequently, Cloud Network, criminal, intentions, unlawfulAbstract
Information is most vital piece of cloud services so gigantic concern ought to be given to its security. A few malicious persons can utilize Cloud computing for unlawful and criminal and active use of cloud for illicit intentions is known cloud ill-use. The biggest need is to maintain, manage information resources in digital format and made resource sharable for multiple access. Every organization is building its resources either by digitizing documents or by entering new data in digital form. Digital resources available are maintained and are being shared frequently over Cloud Network. A few malicious persons could use to Cloud computing for unlawful & criminal & active use of cloud for illicit intentions is called cloud ill-use. The biggest need is to maintain, manage information resources in digital format & made resource sharable for multiple access. Every organization is building its resources either by digitizing documents or by entering new data in digital form. Digital resources available are maintained & are being shared frequently over Cloud Network.
References
Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of Symposium on Network & Distributed System Security, pp. 137–144. IEEE Press, New York (1996)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)
Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641
Cheng, H., Li, X.: Partial encryption of compressed images & videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption & watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.