Loading

Secured Video Transmission Using Encryption by MD5
G.Menaka1, N. Rajendran2

1G.Menaka*, Department of Computer Science, Vivekanandha College of Arts and Sciences for Women, Tiruchengode, (Tamil Nadu), India.
2Prof. Dr. N. Rajendran, Department of Computer Science, Vivekanandha Arts and Science College for Women, Sankari, (Tamil Nadu), India.
Manuscript received on September 21, 2019. | Revised Manuscript received on October 05, 2019. | Manuscript published on October 30, 2019. | PP: 6393-6397 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2073109119/2019©BEIESP | DOI: 10.35940/ijeat.A2073.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Advances in computerized substance transmission have expanded in the previous couple of years. Be that as it may, Security and protection issues of the transmitted information have turned into an imperative worry in mixed media innovation. The paper displays a computationally capable and secure video encryption approach with usage of appropriated and parallel condition. The paper expects to make secure video encryption practical for constant applications with no additional committed equipment at recipient side. Verifying is a major testing assignment especially with respect to affirmation of privacy, confirmation and uprightness. Writing indicates utilization of cryptography and steganography to verify distinctive types of computerized information. The wide utilization of correspondence utilizing Internet has encouraged sharing of content as well as sound and video posts in a less difficult way. A standard encryption calculation is particularly material for content and twofold information yet neglects to deal with voluminous video information. An endeavor has been made in the paper to verify recordings utilizing keyed hash calculations. Experimentation unmistakably uncovered the advantages of the proposed plan regarding guaranteeing trustworthiness and realness without trade off in nature of the video.
Keywords: Cryptography hash encryption function, MPEG code, Secure hash algorithm (SHA-1), Video and text encryption.