The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing
|
Author(s): Raya Basil Alothman (Department of Computer Science, College of Education for Pure Sciences, University of Mosul, Iraq), Imad Ibraheem Saada (Alquds Open University, Palestine)and Basma Salim Bazel Al-Brge (College of Law, Al-Mustansiriayah University, Iraq)
Copyright: 2022
Volume: 24
Issue: 2
Pages: 18
Source title:
Journal of Cases on Information Technology (JCIT)
Editor(s)-in-Chief: Ali Selamat (Universiti Teknologi Malaysia, Malaysia)
DOI: 10.4018/JCIT.20220101.oa1
Purchase
|
Abstract
When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.
Related Content
Ricardo Gregorio Lugo, Ausrius Juozapavicius, Kristina Lapin, Torvald F. Ask, Benjamin J. Knox, Stefan Sütterlin.
© 2025.
13 pages.
|
Jack Ng Kok Wah.
© 2025.
20 pages.
|
Chunyi Lou, Liang Lu, Jianfang Mao, Yan Ding.
© 2025.
16 pages.
|
Zhongqiao Sun, Maochun Wu.
© 2025.
16 pages.
|
Shuanglan Zhao.
© 2025.
23 pages.
|
Meng Liu.
© 2025.
17 pages.
|
Eiman Tamah Al-Shammari.
© 2025.
27 pages.
|
|
|