Abstract

When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.

Highlights

  • Multimedia data security is becoming increasingly important, along with an increase in digital forms of communication on the Internet

  • The comparative study of these current technologies addressed the types of images/videos and the different techniques of image/video processing with the steps used to process the image or video

  • This paper aims at explaining the advantages that companies use to encrypt large volumes of data in quantitative measures such as Speed-Up Ratio by using cloud tools in applying encryption algorithms (RSA, MD5 and Advanced Encryption Standard (AES))

Read more

Summary

Introduction

Multimedia data security is becoming increasingly important, along with an increase in digital forms of communication on the Internet. The use of a wide range of images and videos in various types of applications already puts a great deal of attention on security and privacy issues. Multimedia data encryption helps prevent improper and unintended release of confidential information in transit or storage. Sensitive information is stored on the Internet due to the massive spread of wireless devices. Many of the studies emphasize the significance of cloud computing. Individuals can send and store information on the Internet. In the cloud computing paradigm, security especially in terms of privacy is a major concern. The entirely secure system remains an unfulfilled target that requires many studies and evaluations

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.