An overview of video encryption techniques
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general use...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Association of Computer Science and Information Technology Press (IACSIT)
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/489/ http://irep.iium.edu.my/489/ http://irep.iium.edu.my/489/1/123-G604.pdf |
id |
iium-489 |
---|---|
recordtype |
eprints |
spelling |
iium-4892017-11-21T08:15:26Z http://irep.iium.edu.my/489/ An overview of video encryption techniques Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran TK5101 Telecommunication. Including telegraphy, radio, radar, television With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. While a large number of multimedia encryption schemes have been proposed in the literature and some have been used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes. In this paper, a description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. Achieving an efficiency, flexibility and security is a challenge of researchers. International Association of Computer Science and Information Technology Press (IACSIT) 2010-02 Article PeerReviewed application/pdf en http://irep.iium.edu.my/489/1/123-G604.pdf Abomhara, Mohamed and Zakaria, Omar and Khalifa, Othman Omran (2010) An overview of video encryption techniques. International Journal of Computer Theory and Engineering, 2 (1). pp. 103-110. ISSN 1793-8201 E-ISSN 1793-821X http://www.ijcte.org/papers/123-G604.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran An overview of video encryption techniques |
description |
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. While a large number of multimedia encryption schemes have been proposed in the literature and some have been used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes. In this paper, a description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. Achieving an efficiency, flexibility and security is a challenge of researchers. |
format |
Article |
author |
Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran |
author_facet |
Abomhara, Mohamed Zakaria, Omar Khalifa, Othman Omran |
author_sort |
Abomhara, Mohamed |
title |
An overview of video encryption techniques |
title_short |
An overview of video encryption techniques |
title_full |
An overview of video encryption techniques |
title_fullStr |
An overview of video encryption techniques |
title_full_unstemmed |
An overview of video encryption techniques |
title_sort |
overview of video encryption techniques |
publisher |
International Association of Computer Science and Information Technology Press (IACSIT) |
publishDate |
2010 |
url |
http://irep.iium.edu.my/489/ http://irep.iium.edu.my/489/ http://irep.iium.edu.my/489/1/123-G604.pdf |
first_indexed |
2023-09-18T20:07:37Z |
last_indexed |
2023-09-18T20:07:37Z |
_version_ |
1777407263763333120 |