This paper is published in Volume-4, Issue-2, 2018
Area
Security
Author
Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad
Org/Univ
Terna Engineering College, Navi Mumbai, Maharashtra, India
Pub. Date
31 March, 2018
Paper ID
V4I2-1443
Publisher
Keywords
Cryptography, Cloud Computing, Multimedia Security, Encryption, Decryption.

Citationsacebook

IEEE
Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad. A survey on the security of multimedia contents with dual level encryption, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad (2018). A survey on the security of multimedia contents with dual level encryption. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad. "A survey on the security of multimedia contents with dual level encryption." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

The cloud computing offers high quantifiability, confidentiality and therefore the simple accessibility of the knowledge over the net. tho' the traditional secret writing system provides security, the foremost involved issue is that the regular aspect channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM will extract all info. Thus, this paper implements a double stage secret writing rule for the multimedia system content security exploitation random key generation approach. the primary stage encrypted multimedia system content into ciphertext -l employing a trigonal public key. The ciphertext-l is once more encrypted within the cloud exploitation a willy-nilly generated uneven non-public key. If anyone gets the ciphertext, he couldn't extract the secret writing key to recover the multimedia system contents. Low complexness and simple implementation create the planned rule wide applicable safeguard within the cloud computing.