2016
DOI: 10.1016/j.procs.2016.03.038
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Besides, it is also difficult to manage such huge keys efficiently and securely. The study conducted in [19] focuses on implementing a system capable of encrypting and decrypting the multimedia data. This system uses a mixed model based on the integration of symmetric encryption techniques such as AES and asymmetric ones such as ECC.…”
Section: Aes-based Encryption Algorithmsmentioning
confidence: 99%
“…Besides, it is also difficult to manage such huge keys efficiently and securely. The study conducted in [19] focuses on implementing a system capable of encrypting and decrypting the multimedia data. This system uses a mixed model based on the integration of symmetric encryption techniques such as AES and asymmetric ones such as ECC.…”
Section: Aes-based Encryption Algorithmsmentioning
confidence: 99%
“…The combination of AES-RSA with RDH to obtain a double layer of security provided a high operation speed and security performance. Iyer, Sedamkar and Gupta (2016) proposed the implementation of a system capable of encrypting/decrypting multimedia data (text, images, videos) using the hybrid model of AES and ECC. It was found that even if an attacker gets access to the keys; he/she will not be able to decipher it in a relatively finite amount of man-years.…”
Section: Hybrid Security Approach In Smart Healthcare/ Medical Systemmentioning
confidence: 99%
“…In this study, the algorithm was explained and using CUDA, a part of this algorithm can be implemented in CPU and multiplied by theimplementation of speed [9]. Ayr et al (2016) presented a hybrid model (symmetric and asymmetric) and could increase the data cryptography security using the proposed algorithm [10]. Thomas Perine and Lee Wong (2014) examined the likelihood of attacks like birthday attacks and brute-force.…”
Section: Literature Reviewmentioning
confidence: 99%