INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.5, No.3, Jul. 2015

Implementation of Non-Repudiation Services in Digital Video Generation & Distribution on Android Devices

Full Text (PDF, 658KB), PP.9-20


Views:71   Downloads:1

Author(s)

Pooja Gupta, Ankita Lavania, Madhuri Agarwal, Vrijendra Singh

Index Terms

International Mobile Equipment Identity;International Mobile Subscriber Identity;Non-Repudiation;Elliptic Curve Cryptography

Abstract

With the onset of Digital age, digital videos have been highly prevalent in every sphere of our lives and have replaced other sources of entertainment, information sharing & social interaction. With the increasing use of Mobile devices, Internet & its application it has been quite evident that digital videos are generated and distributed with ease. Quite often such videos are used as evidence depending on the kind of information they provide. Since the video has been distributed at a large level it becomes very difficult to identify the generator device of the digital video especially if the case is of objectionable video contents etc. This paper aims at proposing a framework which will embed the generator device information in the video & will make sure the user identification information can't be changed during the distribution process using internet or other networking services (i.e. Bluetooth).

Cite This Paper

Pooja Gupta, Ankita Lavania, Madhuri Agarwal, Vrijendra Singh,"Implementation of Non-Repudiation Services in Digital Video Generation & Distribution on Android Devices", IJEME, vol.5, no.3, pp.9-20, 2015.DOI: 10.5815/ijeme.2015.03.02

Reference

[1]Saurabh Upadhyay, Sanjay Kumar Singh, Video Authentication- An Overview, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011.

[2]Dinesh Goyal,Naveen Hemrajani, Novel Selective Video Encryption for H.264 Video, International Journal of Information Security Science D. Goyal, N. Hemrajani ,Vol. 3, No. 4.

[3]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow, Elliptic Curve Cryptography in Practice.

[4]KANEKO Hiroshi, OZAWA Takato, NOMURA Toshiyuki, IWAMOTO Kota, Video Identification Solution Using a "Video Signature".

[5]Xiaochun Cao 1, Siyuan Li 1, Feng Jiang 1, Hua Zhang 1, Ling Du1,Xiangui Kang, Device identification Based On H.264 Cues.

[6]Thomas Wiegand, Gary J. Sullivan, Gisle Bjøntegaard, Ajay Luthra, Overview of the H.264/AVC Video Coding Standard, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 13, No. 7, July 2003.

[7]Sabu Emmanuel, Mohan S. Kankanhalli, Digital Rights Management Issues for Video.

[8]Nicholas D. Beser, Thomas E. Duerr, Gregory P. Staisiunas, Authentication of Digital Video Evidence.

[9]Saurabh Upadhyay, Sanjay Kumar Singh, Video Authentication: Issues and Challenges, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012.

[10]Joseph H. Silverman, Brown University, An Introduction to the theory of Elliptic Curves.

[11]Qiong Pu, Xiuying Zhao and Jianmin Ding Department of Electronics, Science Institute, Information Engineering University, Zhengzhou, He'nan, China , Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography.

[12]Sahbuddin Abdul Kadir, Arif Sasongko, Muhammad Zulkifli Electrical Engineering, Bandung Institute of Technology Ganesha 10, Bandung, Indonesia , Simple Power Analysis Attack Against Elliptic Curve Cryptography Processor on FPGA Implementation, 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia.

[13]BAI Qing-hai1, 2, ZHANG Wen-bo1, JIANG Peng1, LU Xu1, 1.Department of Computer Science and Technology, Jilin University, Changchun 130012, P.R.China 2. College of Computer Science and Technology, Inner Mongolia University for Nationalities, Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation, 2012 International Conference on Computer Science and Service System.

[14]Dinesh Goyal, Naveen Hemrajani , Department of Computer Science and Engineering, Suresh Gyan Vihar University, Jaipur, India Department of Computer Science and Engineering, JECRC University, Jaipur, India, Novel Selective Video Encryption for H.264 Video, INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE D. Goyal, N. Hemrajani ,Vol. 3, No. 4.

[15]Point Generation And Base Point Selection In ECC: An Overview Moumita Roy, Nabamita Deb, Amar Jyoti Kumar M Tech. Student, Information Technology, GUIST, Guwahati, India Asst. Professor, Information Technology, GUIST, Guwahati, India M Tech. Student, Information Technology, GUIST, Guwahati, India.

[16]Implementing ECC with Java Standard Edition V. Gayoso Mart´ınez1 and L. Hern´andez Encinas Information Security Institute (ISI), Spanish National Research Council (CSIC), Madrid, Spain victor.gayoso@iec.csic.es; 2luis@iec.csic.es, International Journal of Computer Science and Artificial Intelligence Dec. 2013, Vol. 3 Iss. 4, PP. 134-142 DOI: 10.5963/.

[17]Real Time Implementation of Secured Multimedia Messaging Service System using Android Geetanjali R. Kshirsagar, Savita Kulkarni , Department of Electronics, Maharashtra Institute of Technology, Pune , Department of Electronics and Telecommunication, Maharashtra Institute of Technology, Pune.

[18]Securing MMS with High Performance Elliptic Curve Cryptography, Prof. B. N. Jagdale Prof.R.K.Bedi Sharmishta Desai Assistant Professor, Assistant Professor, PG Student, IT Department, MIT COE, Comp Department, MIT COE, IT Department, MIT COE, Pune, India. Pune, India. Pune, India.

[19]Framework for media data and owner authentication based on cryptography, Watermarking and biometric authentication J. Dittmann, M. Steinebach, L. Croce Ferri, C. Vielhauer, R. Steinmetz, Petra Wohlmacher.

[20]Wireless Network Security Using Elliptic Curve Cryptography , Hero Modares Department of Computer system and technology University of Malaya, KualaLumpur, Malaysia hero.modares@gmail.com, Amirhossein Moravejosharieh Department of Computer system and technology University of Malaya KualaLumpur, Malaysia, Amirhosein.moravej@gmail.com, Rosli Salleh Department of Computer system and technology University of Malaya Kuala Lumpur, Malaysia rosli_salleh@um.edu.my

[21]ELLIPTIC CURVE CRYPTOGRAPHY AND ITS APPLICATIONS Moncef Amara 1 and Amar Siad 2 Universit´e Paris-8, laboratoire LAGA, Saint-Denis / France , amara moncef@yahoo.fr , siad@math.univ-paris13.fr