The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing
|
Author(s): Raya Basil Alothman (Department of Computer Science, College of Education for Pure Sciences, University of Mosul, Iraq), Imad Ibraheem Saada (Alquds Open University, Palestine)and Basma Salim Bazel Al-Brge (College of Law, Al-Mustansiriayah University, Iraq)
Copyright: 2022
Volume: 24
Issue: 2
Pages: 18
Source title:
Journal of Cases on Information Technology (JCIT)
DOI: 10.4018/JCIT.20220101.oa1
Purchase
|
Abstract
When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.
Related Content
Zhi Chen, Jie Liu, Ying Wang.
© 2024.
19 pages.
|
Abida Ellahi, Yasir Javed, Mohammad Farooq Jan, Zaid Sultan.
© 2024.
20 pages.
|
Ping Zhang, Changrong Lv, Qingying Li, Bori Cong, Jian Liu.
© 2024.
19 pages.
|
Andrew J. Setterstrom, Jack T. Marchewka.
© 2024.
22 pages.
|
Lai Xin, Liang Chang Sheng, Jiayu Feng, Hengyan Zhang.
© 2024.
17 pages.
|
Toby Chau, Helen Lv Zhang, Yuyue Gui, Man Fai Lau.
© 2024.
13 pages.
|
Xiaotong Li, Young Sook Lee.
© 2024.
16 pages.
|
|
|