|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 179 - Issue 3 |
| Published: Dec 2017 |
| Authors: Kumar Gaurav, Sanjeev Gupta |
10.5120/ijca2017915857
|
Kumar Gaurav, Sanjeev Gupta . A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach. International Journal of Computer Applications. 179, 3 (Dec 2017), 9-13. DOI=10.5120/ijca2017915857
@article{ 10.5120/ijca2017915857,
author = { Kumar Gaurav,Sanjeev Gupta },
title = { A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach },
journal = { International Journal of Computer Applications },
year = { 2017 },
volume = { 179 },
number = { 3 },
pages = { 9-13 },
doi = { 10.5120/ijca2017915857 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2017
%A Kumar Gaurav
%A Sanjeev Gupta
%T A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach%T
%J International Journal of Computer Applications
%V 179
%N 3
%P 9-13
%R 10.5120/ijca2017915857
%I Foundation of Computer Science (FCS), NY, USA
Visual cryptography encodes a secret binary image (SI) keen on share of unsystematic binary sample. If the share is xeroxed against transparencies, the key figure is often visually decrypted by means that of superimposing a skilled subset of transparencies, however no secret data is obtained from the superposition of a forbidden subset. The binary model of the N allocates, although, contain no visual consequence and hinder the objectives of visual cryptography. The perfect security condition of VC scheme needs the strict demand where any t-1 or fewer transparencies cannot extract much knowledge regarding the key. The secret image is at the same time embedded into color halftone shares. Visual cryptography (VC) could be a secret sharing method of decay a secret picture into n transparencies, and consequently the stack of any t out of n transparencies disclose the key content. A HVC generate procedure is projected that can make an option for secret halftone image into color half-tone shares. In [1], authors centre of attention how to securely distribute video contents to an assured collection of persons for the period of a testing time period in cloud-based multimedia systems, and propose a cryptographic come within reach of, a provably secure time domain attribute-based access control (TAAC) scheme, to secure the cloud-based video content sharing.