A range of video contents and technology have provided convenience to humans, with real-Time video applications-such as surveillance applications-able to contribute to increasing public safety by reducing physical crimes. The development of video technology has made it possible to achieve an improved quality of life. However, this technology can also be exploited and lead to security issues such as physical and digital crimes. Unfortunately, security breaches are increasing in complexity and frequency, making current countermeasures insufficient to prevent them. Given recent trends, we recognize the need for security technology to respond to advanced video crimes. Intelligent security is one of the methods that can be used to respond to these issues. Although research on video data security has been actively conducted, not enough studies have been published on video data security that also addresses intelligent security. Specifically, a classification system for research on video data security has not been provided, and no systematic analysis has been conducted for advanced research. Thus, the purpose of this is to fill in these gaps in existing research. This study offers a classification of research on video data security based on the collection and analysis of related works. Moreover, this study presents an analysis of research on video data security technologies combined with intelligent technologies based on SLR methodology.
CITATION STYLE
Fox, D. (2013). Secure Hash Algorithm SHA-3. Datenschutz Und Datensicherheit - DuD, 37(2), 104–104. https://doi.org/10.1007/s11623-013-0027-z
Mendeley helps you to discover research relevant for your work.