Multimedia a Concern for Security: A Review
Abstract
Full Text:
PDFReferences
W. Kim. Cloud Computing: nowadays and tomorrow. Journal of article innovation. 2009.8(1):65-72p.
P. Gupta and A. K. Brar. An expanded Security Technique for Storage of multimedia framework Content over Cloud Server," International Journal of Engineering investigation and Applications (lJERA).2013.3(4):2273-2277p.
Er. Mandeep Singh Sandhu Er. Radiant Singla. Associate in Nursing Approach to expanded Security of multimedia framework data Model Technology bolstered Cloud Computing.
Sonal Guleria and Sonia Vatta. To upgrade multimedia framework security in cloud computing surroundings abuse Crossbreed rule. International Journal of Application or
Innovation in Engineering and Management. 2013.2.
Alvarez E, Fernández A, García P, Jiménez J, Marcano (1999). A New approach to chaotic encryption. A Physics Letters , 263(4–6),373–375p.
Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar. “Image Encryption Using Affine Transform and XOR Operation ”,International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011),2011.309-312p.
Borko Furht, Daniel Socek,(2003),“Multimedia Security: Encryption Techniques,” IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, 2003.
Bruce Schneier, (1996) “Applied cryptography: protocols algorithms and source code in C”. Second Edition, Wiley Publications.
Bruce Schneier, John Kelsey , Doug Whiting , David Wagner , Chris Hall , Niels Ferguson, (1998)“Twofish: A 128-Bit Block Cipher”, June 1998. AES submission.
Bruce Schneier,(1994) Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Proceedings of Fast Software Encryption, Cambridge Security Workshop (December 1993), Springer-Verlag, , 191-204o
Refbacks
- There are currently no refbacks.