International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 179 - Issue 3 |
Published: Dec 2017 |
Authors: Kumar Gaurav, Sanjeev Gupta |
![]() |
Kumar Gaurav, Sanjeev Gupta . A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach. International Journal of Computer Applications. 179, 3 (Dec 2017), 9-13. DOI=10.5120/ijca2017915857
@article{ 10.5120/ijca2017915857, author = { Kumar Gaurav,Sanjeev Gupta }, title = { A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 179 }, number = { 3 }, pages = { 9-13 }, doi = { 10.5120/ijca2017915857 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Kumar Gaurav %A Sanjeev Gupta %T A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach%T %J International Journal of Computer Applications %V 179 %N 3 %P 9-13 %R 10.5120/ijca2017915857 %I Foundation of Computer Science (FCS), NY, USA
Visual cryptography encodes a secret binary image (SI) keen on share of unsystematic binary sample. If the share is xeroxed against transparencies, the key figure is often visually decrypted by means that of superimposing a skilled subset of transparencies, however no secret data is obtained from the superposition of a forbidden subset. The binary model of the N allocates, although, contain no visual consequence and hinder the objectives of visual cryptography. The perfect security condition of VC scheme needs the strict demand where any t-1 or fewer transparencies cannot extract much knowledge regarding the key. The secret image is at the same time embedded into color halftone shares. Visual cryptography (VC) could be a secret sharing method of decay a secret picture into n transparencies, and consequently the stack of any t out of n transparencies disclose the key content. A HVC generate procedure is projected that can make an option for secret halftone image into color half-tone shares. In [1], authors centre of attention how to securely distribute video contents to an assured collection of persons for the period of a testing time period in cloud-based multimedia systems, and propose a cryptographic come within reach of, a provably secure time domain attribute-based access control (TAAC) scheme, to secure the cloud-based video content sharing.