ENHANCEMENT OF MULTIMEDIA SECURITY IN CLOUD COMPUTING
Keywords:
Multimedia, unauthorized, digitizingAbstract
Information is most vital piece of cloud services so gigantic concern ought to be given to its security. A few malicious persons can utilize Cloud computing for unlawful and criminal and active use of cloud for illicit intentions is called cloud ill-use. The biggest need is to maintain, manage information resources in digital format and made resource sharable for multiple access. Every organization is building its resources either by digitizing documents or by entering new data in digital form. Digital resources available are maintained and are being shared frequently over Cloud Network. Cloud Server is giving importance to its digital collections of multimedia data. Multimedia data are becoming main source of information in a library and preferred mode of acquisition for collection development. digital materials are not secure on network by its nature. There is risk of unauthorized use of these materials. Maximum efforts are made to create digital contents whereas less attention is given to its security and security threats are in many forms.
References
Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)
Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.