Abstract
During real time there are problems in transmitting video directly to the client. One of the main problems is, intermediate intelligent proxy can easily hack the data as the transmitter fails to address authentication, and fails to provide security guarantees. Hence we provide steganography and cryptography mechanisms like secure-code, IP address and checksum for authentication and AES algorithm with secret key for security. Although the hacker hacks the video during transmission, he cannot view the information. Based on IP address and secure-code, the authenticated user only can get connected to the transmitter and view the information. For further improvement in security, the video is converted into frames and these frames are split into groups and separate shared key is applied to each group of frames for encryption and decryption. This secured communication process is applied in image processing modules like face detection, edge detection and color object detection. To reduce the computation time multi-core CPU processing is utilized. Using multi-core, the tasks are processed in parallel fashion.
Publisher
Trans Tech Publications, Ltd.
Reference13 articles.
1. A. Lee, NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal Government, National Institute of Standards and Technology, November (1999).
2. J. Daemen and V. Rijmen, The block cipher Rijndael, Smart Card research and Applications, LNCS 1820, Springer-Verlag, pp.288-296.
3. M. Pitchaiah, Philemon Daniel, Praveen, Implementation of Advanced Encryption Standard Algorithm, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March 2012 ISSN 2229-5518.
4. Alejandro Hevia, Craig Gentry, Ravi Jain, Toshiro Kawahara and Zulfikar Ramzan, End-to-End Security in the Presence of Intelligent Data Adapting Proxies: The Case of Authenticating Transcoded Streaming Media, in IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, February (2005).
5. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, pp.81-83.