2017
DOI: 10.21833/ijaas.2017.010.013
|View full text |Cite
|
Sign up to set email alerts
|

Overview of securing multimedia content using efficient encryption methods and modes

Abstract: Multimedia comprises of audio, text, image and video. Use of multimedia is increasing because of improvements in hardware, algorithms and networking. Confidentiality of data is the primary concern due to applications in commerce, telemedicine, Internet television, video telephony, multiparty P2P conferences, video on demand and military. Multimedia files are data intensive thus, they need more computational power and consume more memory as compared to ordinary text data. Comparative analysis of vulnerabilities… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…where 1 2 3, , , , n g g g g are randomly chosen elements from extension field A parity check matrix can be represented as Fresenius power of h. The detail of rank codes is described in [21].…”
Section: B Rank Codesmentioning
confidence: 99%
See 1 more Smart Citation
“…where 1 2 3, , , , n g g g g are randomly chosen elements from extension field A parity check matrix can be represented as Fresenius power of h. The detail of rank codes is described in [21].…”
Section: B Rank Codesmentioning
confidence: 99%
“…However, it gained so much popularity that it is still considered as a credible postquantum alternative to traditional cryptography [20]. Various encryption approaches are discussed by research community [21][22][23][24]. *Corresponding Author.…”
Section: Introductionmentioning
confidence: 99%