An overview of video encryption techniques
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general use...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Association of Computer Science and Information Technology Press (IACSIT)
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/489/1/123-G604.pdf http://irep.iium.edu.my/489/ http://www.ijcte.org/papers/123-G604.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.489 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.4892017-11-21T08:15:26Z http://irep.iium.edu.my/489/ An overview of video encryption techniques Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran TK5101 Telecommunication. Including telegraphy, radio, radar, television With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. While a large number of multimedia encryption schemes have been proposed in the literature and some have been used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes. In this paper, a description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. Achieving an efficiency, flexibility and security is a challenge of researchers. International Association of Computer Science and Information Technology Press (IACSIT) 2010-02 Article REM application/pdf en http://irep.iium.edu.my/489/1/123-G604.pdf Abomhara, Mohamed and Zakaria, Omar and Khalifa, Othman Omran (2010) An overview of video encryption techniques. International Journal of Computer Theory and Engineering, 2 (1). pp. 103-110. ISSN 1793-8201 http://www.ijcte.org/papers/123-G604.pdf |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran An overview of video encryption techniques |
description |
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. While a large number of multimedia encryption schemes have been proposed in the literature and some have been used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes. In this paper, a description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. Achieving an efficiency, flexibility and security is a challenge of researchers. |
format |
Article |
author |
Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran |
author_facet |
Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran |
author_sort |
Abomhara, Mohamed |
title |
An overview of video encryption techniques |
title_short |
An overview of video encryption techniques |
title_full |
An overview of video encryption techniques |
title_fullStr |
An overview of video encryption techniques |
title_full_unstemmed |
An overview of video encryption techniques |
title_sort |
overview of video encryption techniques |
publisher |
International Association of Computer Science and Information Technology Press (IACSIT) |
publishDate |
2010 |
url |
http://irep.iium.edu.my/489/1/123-G604.pdf http://irep.iium.edu.my/489/ http://www.ijcte.org/papers/123-G604.pdf |
_version_ |
1643604621262848000 |