
A PERFORMANCE BASED COMPARATIVE ENCRYPTION AND DECRYPTION TECHNIQUE FOR IMAGE AND VIDEO FOR MOBILE COMPUTING
Publication year - 2022
Publication title -
journal of cases on information technology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.228
H-Index - 14
eISSN - 1548-7725
pISSN - 1548-7717
DOI - 10.4018/jcit.20220401oa01
Subject(s) - encryption , computer science , process (computing) , task (project management) , mobile device , confidentiality , image processing , computer security , multimedia , computer vision , artificial intelligence , image (mathematics) , world wide web , engineering , operating system , systems engineering
When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.