2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7830094
|View full text |Cite
|
Sign up to set email alerts
|

A novel idea of video encryption using hybrid cryptographic techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Proposed scheme Existing scheme (Iyer et al, 2017) Existing scheme (Deshmukh and Kolhe, 2014) From Table 3, we can obviously see that the time required for the encryption scheme proposed in this paper is less than the time required for the existing video encryption scheme.…”
Section: Size Of Filementioning
confidence: 93%
See 2 more Smart Citations
“…Proposed scheme Existing scheme (Iyer et al, 2017) Existing scheme (Deshmukh and Kolhe, 2014) From Table 3, we can obviously see that the time required for the encryption scheme proposed in this paper is less than the time required for the existing video encryption scheme.…”
Section: Size Of Filementioning
confidence: 93%
“…And these encryption schemes are different in terms of security, computational complexity and encryption/decryption speed due to different scenarios. There are two kinds of common video encryption technologies (Malladar and Kunte, 2016), one is full encryption (Negi, 2013;Iyer et al, 2017;Giradkar and Bhattacharya, 2015), the other is selective encryption (Khan, 2017;Dufaux and Ebrahimi, 2008;Saleh et al, 2015;Hamidouche et al, 2017;Hole and Kolhekar, 2017). Several encryption schemes have been proposed in the literature.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Android system is an open source operating system based on Linux kernel development, mainly used in smart mobile terminals. Android system belongs to a software set, adopts the layered architecture, android is divided into four layers, from high level to low level are application, application framework, system runtime and linux kernel [4]. The architecture diagram is as show in Figure . 1.…”
Section: Designmentioning
confidence: 99%
“…In 2016, Iyer et al [29] suggesting the video encryption is important as the communication based on video data is increasing. The video information that movements back and forth between the sender and the beneficiary needs to go through the most unsecure medium of correspondence, the web.…”
Section: Literature Reviewmentioning
confidence: 99%