Security of multimedia content for ownership identification using signaling technique | IEEE Conference Publication | IEEE Xplore

Security of multimedia content for ownership identification using signaling technique

Publisher: IEEE

Abstract:

The information shared over network like audio and video files will be having major challenge due to security credentials. In large scale systems like cloud infrastructur...View more

Abstract:

The information shared over network like audio and video files will be having major challenge due to security credentials. In large scale systems like cloud infrastructure used to improve the better security from past one decade. The contents are like pictures, audio and video clips are shared over the online training sessions in recent days. Therefore the video files are used to protect using digital signature and digital watermarking. The content of the multimedia files are require the better environment for sharing of knowledge using private and public clouds. The digital signature method is used for multimedia components such as 2D and 3D video clips and shared among the users on cloud infrastructure will be predicted with various cloud based security techniques.
Date of Conference: 27-29 January 2021
Date Added to IEEE Xplore: 21 April 2021
ISBN Information:
Print on Demand(PoD) ISSN: 2329-7190
Publisher: IEEE
Conference Location: Coimbatore, India

I. Introduction

The security is the major headache in day today to protect data from unauthorized person. At the same time the sound knowledge is required to setup the secured environment to exchange of information over any network application. Particularly in day today due to corona, most of the students involving online training with various applications. The cloud environment is used to provide reliable service to the end users to protect the information. The standard mechanism is used to protect videos and audio clips shared over the network. The information shared over the network will be used to protect the information using various applications and security mechanisms.

References

References is not available for this document.