A Survey on Security of Multimedia using Various Soft Computing Techniques

In the recent years, with the development of network and multimedia technology, multimedia data, especially image, audio and video data are used more and more widely in human society. In this regard, to protect multimedia contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications. This Paper, make a survey on various techniques for securities of Multimedia content using soft computing approach.

[1]  Reshu Choudhary,et al.  Multimedia Content Security using Image Encryption , 2014 .

[2]  Yoshiyasu Takefuji,et al.  Damageless image hashing using neural network , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.

[3]  Giovanni Soda,et al.  Towards Incremental Parsing of Natural Language Using Recursive Neural Networks , 2003, Applied Intelligence.

[4]  W. Pitts,et al.  A Logical Calculus of the Ideas Immanent in Nervous Activity (1943) , 2021, Ideas That Created the Future.

[5]  R. Sarker,et al.  Artificial Neural Networks in Finance and Manufacturing , 2006 .

[6]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[7]  Shyam Nandan Kumar Technique for Security of Multimedia using Neural Network , 2014 .

[8]  Jianguo Jiang,et al.  Multimedia Security: A Survey of Chaos-Based Encryption Technology , 2012 .

[9]  Wansheng Tang,et al.  Noise removal using Cohen-Grossberg neural network for improving the quality of the decrypted image in color encryption , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[10]  S. Anna Durai,et al.  Image Compression with Back-Propagation Neural Network using Cumulative Distribution Function , 2008 .

[11]  W S McCulloch,et al.  A logical calculus of the ideas immanent in nervous activity , 1990, The Philosophy of Artificial Intelligence.

[12]  Shiguo Lian,et al.  A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network , 2004, ICONIP.

[13]  Wansheng Tang,et al.  Color image associative memory on a class of Cohen-Grossberg networks , 2010, Pattern Recognit..

[14]  Stephen Grossberg,et al.  Absolute stability of global pattern formation and parallel memory storage by competitive neural networks , 1983, IEEE Transactions on Systems, Man, and Cybernetics.

[15]  Tony R. Martinez,et al.  Improved Backpropagation Learning in Neural Networks with Windowed Momentum , 2002, Int. J. Neural Syst..

[16]  P. Thangavel,et al.  Noise Removal Using Hopfield Neural Network in Message Transmission Systems , 2008, 2008 Second UKSIM European Symposium on Computer Modeling and Simulation.

[17]  Lee-Ming Cheng,et al.  Pseudorandom generator based on clipped Hopfield neural network , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[18]  Vasilios Zorkadis,et al.  On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators , 2003, Neural Networks.

[19]  David S. Taubman,et al.  High performance scalable image compression with EBCOT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).