Secure Video Processing And Water Mark Embedding Using Shamir Secret Rule

Authors

  • Mohammed Salman Uddin PG Scholar, Department of Computer Science & Engineering, ISL Engineering College, Hyderabad, India. Author
  • Dr. Md Zainlabuddin Associate Professor, PG Scholar, Department of Computer Science & Engineering, ISL Engineering College, Hyderabad, India. Author

Keywords:

Secure Video Processing, Digital Watermarking, Shamir’s Secret Sharing, Video Encryption, Frame-Level Encryption, Cryptography, OpenCV, Key Management, Data Security, Secure Multimedia Transmission.

Abstract

With an emphasis on user identification, video encryption, and decryption capabilities, this project makes safe video processing, encryption, and watermark insertion possible. Registering, logging in, and uploading videos with watermarks for processing are all possible. Every submitted video is encrypted using the cryptography library, and Shamir's Secret Sharing is used to partition the encryption key, guaranteeing safe key distribution and storage. In order to be retrieved and decrypted later, the encrypted frames are stored independently. By reassembling key shares, decryption is accomplished, enabling the reconstruction of the original movie while removing the watermark from the first frame. Additionally, the application offers the ability to examine split frames, download the decrypted video, and browse contact and performance information pages. With a user-friendly interface and strong back-end encryption mechanisms, this system guarantees data confidentiality and integrity by using OpenCV for video processing and secure file management techniques. Sensitive data, such as encrypted frames and key shares, are uploaded and stored securely by the program in designated folders. To further prevent unwanted access to the decryption process, key shares are kept apart.

 

Downloads

Published

2026-03-25

How to Cite

Secure Video Processing And Water Mark Embedding Using Shamir Secret Rule. (2026). International Journal of Artificial Intelligence and Computer Electronics, 2(1), 25-31. https://ijaice.com/journal/index.php/ijaice/article/view/9