Comparison of Encryption Algorithms for Multimedia

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of MPEG encryption algorithms

Over the last three years, several encryption algorithms, applied to MPEG video streams, emerged. Most of the algorithms tried to optimize the encryption process with respect to the encryption speed due to the temporal properties of video retieval and display process. Permutation Algorithm, with respect to not only their encryption speed metric, but also their security level and stream size met...

متن کامل

Comparison of Data Encryption Algorithms

COMPARISON OF DATA ENCRYPTION ALGORITHMS Simar Preet Singh, and Raman Maini University College of Engineering, Punjabi University, Patiala, INDIA, E-mail: [email protected], [email protected] This paper tries to present a fair comparison between the most common and used algorithms in the data encryption field. The two main characteristics that identify and differentiate one en...

متن کامل

Comparison of TACIT Encryption Algorithm with Various Encryption Algorithms

A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm distribution of keys also more important is to make an e...

متن کامل

A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms

Secrete permutations are widely used in multimedia encryption algorithms, and many permutation-only ciphers have been proposed in recent years for protection of different types of multimedia data, especially digital images and videos. Based on a normalized encryption/decryption model, this paper analyzes the security of permutation-only image ciphers working in spatial domain from a general per...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Rajshahi University Journal of Science and Engineering

سال: 2016

ISSN: 2408-8803,2309-0952

DOI: 10.3329/rujse.v44i0.30398