Abstract

Many people consume multimedia content (images, music, movie) on portable devices like DVD player, MP3 player, Portable Multimedia Player and also through Internet. Problem statement: The conventional algorithms such as DES and AES cannot be used directly in multimedia data, since multimedia data are repeatedly have high redundancy, large-volumes and require real-time operations, such as displaying, cutting, copying, bit-rate conversion and so forth. A block cipher is usually used to encrypt multimedia content because of its reasonable security and performance. Approach: In this study, we introduce a naive approach of efficient multimedia content encryption scheme which uses a block of bits rather than bytes or pixels. The proposed block cipher encrypts any type of compressed multimedia content by random substitution using binary tree traversal, row shifting and column shifting. Results: Experimental results show that the new algorithm has better performance than DES algorithm, encrypting multimedia content by dividing the plaintext by blocks. Conclusion: The proposed algorithm is implemented for all types of multimedia files like audio, video, images and text data and this algorithm can be used to multimedia data during transmisson through Internet or through any communication channels.

Highlights

  • In today‘s information age, data transmission plays an important role which is contributed to the growth of technologies

  • Security analysis: This section addresses the security of the proposed encryption technique and analysis of experimental results

  • The pseudo random permutation which is generated by the key value has no influence on the plaintext recovered from the decryption process

Read more

Summary

Introduction

In today‘s information age, data transmission plays an important role which is contributed to the growth of technologies. Electronic security is increasingly involved in making communications more prevalent. A mechanism is needed to assure the security and privacy of information that is sent over the electronic communications media is in need. Whether the communications media is wired or wireless, both can not be protected from unauthorized reception or interception of transmission. More and more businesses make use of communication networks, share potential information and sensitive data is located in communications network transmissions that are connected all over the world. This commitment to data communication has increased the vulnerability of organization assets. Computer fraud is becoming one of the most popular crimes in our days

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call