SEPERABLE AND REVISIBLE DATA HIDING USING TRIPLE ENCRYPTION STANDARD IN CLOUD COMPUTING

Mrs. K.E. Eswari, M.C.A., M.Phil., M.E., SET, S.Balaji
2022 Zenodo  
Wireless multimedia dispatches have developed fleetly with adding wireless access bandwidth and popular intelligent bias. In the decade, a number of studies have been conducted to design robust and effective schemes for delivering multimedia content over error-prone wireless networks. In discrepancy, veritably many of those studies have concentrated on the security aspect of similar transmission. There have been adding demands for the security of wireless multimedia Operations in recent times.
more » ... ireless networks when compared to traditional wired networks, are more likely prone to vicious attacks. Current security styles include physical layer and operation layer security technologies singly and independently. Generally, physical layer information is dynamic in wireless networks, and operation layer information is related to wireless multimedia content delivery; both have significant impact on security performance. This study proposes a common frame combining both the physical and operation layer security technologies. Specifically, by exercising the security capacity and signal processing technologies at the physical layer and the authentication and watermarking strategies at the operation layer, the available network coffers can be employed efficiently. Moreover, scalable multimedia security services could be maximized within given multimedia delivery deadlines. So, in particular, this common scheme could be enforced fluently with low communication above, which facilitates the deployment in large-scale wireless multimedia systems.
doi:10.5281/zenodo.6530176 fatcat:2gj5skcw3jc3zgjuw4dcmhvjle