z-logo
open-access-imgOpen Access
A PERFORMANCE BASED COMPARATIVE ENCRYPTION AND DECRYPTION TECHNIQUE FOR IMAGE AND VIDEO FOR MOBILE COMPUTING
Publication year - 2022
Publication title -
journal of cases on information technology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.228
H-Index - 14
eISSN - 1548-7725
pISSN - 1548-7717
DOI - 10.4018/jcit.20220401oa01
Subject(s) - encryption , computer science , process (computing) , task (project management) , mobile device , confidentiality , image processing , computer security , multimedia , computer vision , artificial intelligence , image (mathematics) , world wide web , engineering , operating system , systems engineering
When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here