2019 Innovations in Power and Advanced Computing Technologies (I-Pact) 2019
DOI: 10.1109/i-pact44901.2019.8960002
|View full text |Cite
|
Sign up to set email alerts
|

Intensifying Multimedia Information Security Using Comprehensive Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Some researches emphasized on identity-based batch verification schemes to facilitate the signing of messages and verification of the signature of messages in ad hoc networks. Many researchers focused on enhancing the efficiency of batch verification algorithms rather than improvising the identification of invalid signatures [2,[10][11][12]. Such batch verification schemes cause performance degradation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some researches emphasized on identity-based batch verification schemes to facilitate the signing of messages and verification of the signature of messages in ad hoc networks. Many researchers focused on enhancing the efficiency of batch verification algorithms rather than improvising the identification of invalid signatures [2,[10][11][12]. Such batch verification schemes cause performance degradation.…”
Section: Related Workmentioning
confidence: 99%
“…This proposed security model is less expensive than the existing approaches that involve Trusted Third Party or Certificate Authority for issuing of public certificates [22][23][24][25][26][27]. The proposed approach objectives can extend using other extensive technologies as a part of Industry 5.0 [2,[11][12][13][14][15][28][29][30][31].…”
Section: Decryption Processmentioning
confidence: 99%
“…On the other hand, fully homomorphic encryption schemes [8,9] are computationally inefficient and thus impractical [10]. Some encryption schemes are designed to protect multimedia data transmitted over an insecure channel [11,12]. As considered in [13], secret sharing is an efficient and practical approach to protecting the confidentiality of outsourced databases in contrast to data encryption.…”
Section: Introductionmentioning
confidence: 99%
“…e life cycle of network multimedia data can be divided into four main parts: collection, transmission, storage, and processing. Regarding these functions, in order to protect the confidentiality of data transmission and storage and prevent the leakage of private data, it is necessary to encrypt the data [3]. However, the current network equipment and components have a large number of security vulnerabilities, allowing attackers to directly bypass the encryption link and steal the original data [4].…”
Section: Introductionmentioning
confidence: 99%