Video Encryption And Optimization

2021 ◽  
Vol 8 (5) ◽  
Keyword(s):  
Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2017 ◽  
Vol 2 (3) ◽  
pp. 32-39
Author(s):  
Aya Khalid Naji ◽  
Saad Najim Alsaad

In the development of 3G devices, all elements of multimedia (text, image, audio, and video) are becoming crucial choice for communication. The secured system in 3G devices has become an issue of importance, on which lot of research is going on. The traditional cryptosystem like DES, AES, and RSA do not able to meet with the properties of the new generation of digital mobile devices. This paper presents an implementation of video protection of fully encrypted using Elliptic Curve   Cryptography (ECC) on a mobile device. The Android platform is used for this purpose.  The results refer that the two important criteria of video mobile encryption: the short computation time required and high confidentially are provided.


Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The paper displays a computationally capable and secure video encryption approach with usage of appropriated and parallel condition. The paper expects to make secure video encryption practical for constant applications with no additional committed equipment at recipient side. Verifying is a major testing assignment especially with respect to affirmation of privacy, confirmation and uprightness. Writing indicates utilization of cryptography and steganography to verify distinctive types of computerized information. The wide utilization of correspondence utilizing Internet has encouraged sharing of content as well as sound and video posts in a less difficult way. A standard encryption calculation is particularly material for content and twofold information yet neglects to deal with voluminous video information. An endeavor has been made in the paper to verify recordings utilizing keyed hash calculations. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without trade off in nature of the video.


Sign in / Sign up

Export Citation Format

Share Document