R Dak, D Singh, N Choudhary - International Journal of Computer …, 2014 - academia.edu
With the fast expansion of a variety of multimedia technologies, further and more multimedia statistics are produced and transmitted in the fields like military, medical and for further …
In this growing digital world, everything is on air and a lot of multimedia data flows online every second. Day by day more and more multimedia technologies are being introduced …
P Pasalkar, N Nadar, N Panchal, M Desai - academia.edu
Video is a set of images. Video encryption is encrypting those set of images. Thus video encryption is simply hiding your video from prying eyes. Video monitoring has always been …
V Mishra, S Maheshwari, K Choudhary - … on ICA, 22-24 December 2014, 2015 - Springer
The video data that are used in the multimedia applications are not completely secure because of multiple unsecured hops present between the sender and the receiver. Any …
V Mishra, K Choudhary… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The video streaming between the sender and the receiver involves multiple unsecured hops where the video data can be illegally copied if the nodes run malicious forwarding logic. This …
V Mishra, K Choudhary, S Maheshwari - International Journal of …, 2014 - academia.edu
In this paper video transmission in the Internet scenario, where packets move from source to destination, has been studied. In this various methods and schemes are discussed to …