We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm

by Gemini Garg, Jaspreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 16
Year of Publication: 2015
Authors: Gemini Garg, Jaspreet Kaur
10.5120/ijca2015906776

Gemini Garg, Jaspreet Kaur . A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm. International Journal of Computer Applications. 129, 16 ( November 2015), 1-5. DOI=10.5120/ijca2015906776

@article{ 10.5120/ijca2015906776,
author = { Gemini Garg, Jaspreet Kaur },
title = { A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 16 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number16/23154-2015906776/ },
doi = { 10.5120/ijca2015906776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:33.923300+05:30
%A Gemini Garg
%A Jaspreet Kaur
%T A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 16
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the new development in computer networking expertise, delivery of the digital multimedia content through the internet is huge. However, the increase number of the digital credentials, all inclusive availability, and the multimedia dispensation tools of Internet entrance has created a very easy medium for exclusive rights trickery and out of manage distribution of multimedia contented. A most important constraint now is to protect the thinker property of multimedia content in multimedia organization. So, in this document multimedia protection will be providing using SKIP JACK and Elgamal algorithm. The full implementation is done in .NET structure.

References
  1. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28[Online]. Available: http://radlab.cs.berkeley.edu/
  2. Vikas Goyal, Dr. Chander Kant, International Journal ofEngineering Sciences, ISSN : 2229-6913, September 2011,4, pp. 274-282. “Security Issues for Cloud Computing”.
  3. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28[Online]. Available: http://radlab.cs.berkeley.edu/
  4. R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities,” in Proc. 10th IEEE Int. Conf. High Performance Computing and Communications, 2008, pp. 5–13.
  5. Rajnish Choubey, Rajshree Dubey and Joy Bhattacharjee, “A Survey on Cloud Computing Security, Challenges and Threats”, International Journal on Computer Science and Engineering (IJCSE), pp:1227 – 1231, Vol. 3 No. 3 Mar 2011, ISSN : 0975-3397
  6. B. Aljaber, T. Jacobs, K. Nadiminti, and R. Buyya, “Multimedia on global grids: A case study in distributed ray tracing,” Malays. J. Comput. Sci., vol. 20, no. 1, pp. 1–11, June 2007.
  7. J. Nieh and S. J. Yang, “Measuring the multimedia performance of server based computing,” in Proc. 10th Int. Workshop on Network and Operating System Support for Digital Audio and Video, 2000, pp. 55–64.
  8. Wenwu Zhu, Chong Luo, Jianfeng Wang, and Shipeng Li; “Multimedia Cloud Computing” Digital Object Identifier 10.1109/MSP.2011.940269 Date of publication: 19 April 2011.
  9. D.DanielM.Sona, , S.Vanitha“A Survey on Efficient Video Sharing and Streaming in Cloud Environment Using Video cloud”Vol. 1, Issue 8, October 2013.
  10. Douglas Selent, “Advanced Encryption Standard”, Rivier Academic Journal, Volume 6, Number 2, 2010.
  11. Anna C.Squicciarini Dan Lin,Smitha Sundareswaran, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE 2012.
  12. Boyang Wang, Jingbo Yan, Xuefeng Liu, YuqingZhang,”Mona: Secure Multi-Owner Data Sharin for Dynamic Groups in the Cloud,”IEEE 2013. Larry A. Dunning and Ray Kresman,” Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE 2013.
  13. KuiRen ,Ming Li, Shucheng Yu ,Yao ZhengWenjing Lou, , “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE 2013.
  14. Sonal Guleria1, Dr. Sonia Vatta, “To Enhance Multimedia Security in Cloud Computing Environment Using Crossbreed Algorithm”, International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 2, 2013.
  15. Cong Wang, KuiRen, Ning Cao,Qian Wang,Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Multimedia cloud security SKIPJACK Elgamal Cloud Computing Video Text.