Abstract:With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, prov… Show more
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6…”
Section: Literature Surveymentioning
confidence: 99%
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6 Another important addition is the Diffie-Hellman protocol to ensure the exchange of a secret key between two parties. Entity authentication is one of the key objectives of these algorithms.…”
Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improvement in the security level, as well as for the received signal quality. The selection of a proper combination of encryption and modulation techniques can improve the overall effectiveness of both the security level and the received signal quality. The combination of asymmetric cryptography (here use RSA (Rivest–Shamir–Adleman) algorithm) algorithm with the proposed reflex klystron-based frequency shift keying (FSK) modulation technique provides a high level of secure communication system. The performance of the proposed technique is experimentally verified. The conventional FSK modulation technique operates in the low-frequency band, but the proposed FSK modulation technique is powered by high-power microwave devices, which operate in the X band. The experimental result has been demonstrated and successfully verified for secured communication using the X band.
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6…”
Section: Literature Surveymentioning
confidence: 99%
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6 Another important addition is the Diffie-Hellman protocol to ensure the exchange of a secret key between two parties. Entity authentication is one of the key objectives of these algorithms.…”
Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improvement in the security level, as well as for the received signal quality. The selection of a proper combination of encryption and modulation techniques can improve the overall effectiveness of both the security level and the received signal quality. The combination of asymmetric cryptography (here use RSA (Rivest–Shamir–Adleman) algorithm) algorithm with the proposed reflex klystron-based frequency shift keying (FSK) modulation technique provides a high level of secure communication system. The performance of the proposed technique is experimentally verified. The conventional FSK modulation technique operates in the low-frequency band, but the proposed FSK modulation technique is powered by high-power microwave devices, which operate in the X band. The experimental result has been demonstrated and successfully verified for secured communication using the X band.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.