An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce

An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce

Garv Modwel, Anu Mehra, Nitin Rakesh, K K. Mishra
Copyright: © 2019 |Volume: 10 |Issue: 3 |Pages: 22
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522566625|DOI: 10.4018/IJISMD.2019070102
Cite Article Cite Article

MLA

Modwel, Garv, et al. "An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce." IJISMD vol.10, no.3 2019: pp.19-40. http://doi.org/10.4018/IJISMD.2019070102

APA

Modwel, G., Mehra, A., Rakesh, N., & Mishra, K. K. (2019). An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce. International Journal of Information System Modeling and Design (IJISMD), 10(3), 19-40. http://doi.org/10.4018/IJISMD.2019070102

Chicago

Modwel, Garv, et al. "An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce," International Journal of Information System Modeling and Design (IJISMD) 10, no.3: 19-40. http://doi.org/10.4018/IJISMD.2019070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Whenever there is a copywrite protection an article or official material it is usually encrypted with specific information that can only be decrypted by the person who created the document and the owner can claim the ownership of the original document. This type of encryption is called watermarking. This can be used by different e-commerce sites like Netflix, Amazon Prime, who can protect their media through the process of watermarking. As computational power is increasing along with applied mathematics, the application area is now available for multimedia files. This article focuses on encryption of video files so that the owner can claim the ownership of the created video file. The technology also enables the secrecy of the encryption between the sender and the receiver so that receiver can decrypt the file and receive the ownership that is being transferred from the user. In another way, any e-commerce site can claim the ownership of their media if it is pirated.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.