Abstract

Problem statement: When we send any video data over the network it co nsumes more time. This is due to the huge size of the video fil e when compared to text file. Therefore, video data should be compressed before sending to the destinat ion. Another important factor during data transfer is security. Joint compression and encryption is e mployed to enable faster and secured transmission o f video data. Approach: Compression and encryption algorithms can be classi fied into two main categories: Independent encryption technique and jo int compression and encryption technique. Independent encryption techniques can further be cl assified as heavy weight and light weight encryption algorithms. There are many algorithms available in the joint compression and encryption technique. Comparative study of the above mentioned algorithms is done in this study. Results: Based on our study, found joint compression and encryptio n algorithms reduced 40% of the memory storage size and they increased execution speed up to 21%. Conclusion: Joint compression and encryption algorithms perform better in terms of speed and sec urity when compared to independent encryption algorithms. This is because they employ compression before encryption.

Highlights

  • The revolution of multimedia and hyper media has been a driving force behind fast and secured data transmission techniques

  • Video Encryption Algorithm (VEA) has the disadvantages of having known-plaintext attack and complex key management scheme

  • In joint compression and encryption technique, selective encryption is employed in order to provide quick results

Read more

Summary

INTRODUCTION

The revolution of multimedia and hyper media has been a driving force behind fast and secured data transmission techniques. There are two approaches for joint compression and encryption algorithm: the first method employs encryption after compression and the second method does encryption before compression Any joint compression and encryption algorithm will provide two levels of security and consumes less time when compared to independent compression and encryption algorithms. Elliptic Curve Cryptography (ECC) (Hitchcock, 2003), solution is vulnerable to security threats It has Pretty Good Privacy (PGP) (Li et al, 2002), Tiny increased computational complexity when compared to Encryption Algorithm (TEA) Pretty Good Privacy (PGP) algorithm is mainly used for secured communication through an electronic environment (Li et al, 2002) It is very complex to transfer a video data

MATERIALS AND METHODS
AND DISCUSSION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call