2009 International Conference on Networking and Media Convergence 2009
DOI: 10.1109/icnm.2009.4907203
|View full text |Cite
|
Sign up to set email alerts
|

Performance of encryption techniques for real time video streaming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
1

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 6 publications
0
7
0
1
Order By: Relevance
“…and Abdul-Kader, H.M. studies the effectiveness of encrypting MPEG-4 using AES. The authors also compare the AES with RC4 and XOR with text, audio and video data types [4]. It was concluded in March 2011, by J. shah and Dr. V. Saxena from the analysis and Comparison of the encryption algorithms with respect to various parameters like encryption ratio, speed, compression friendliness, visual degradation and cryptographic security is presented.…”
Section: Figure1 Symmetric Key Encryption/decryption Methodsmentioning
confidence: 99%
“…and Abdul-Kader, H.M. studies the effectiveness of encrypting MPEG-4 using AES. The authors also compare the AES with RC4 and XOR with text, audio and video data types [4]. It was concluded in March 2011, by J. shah and Dr. V. Saxena from the analysis and Comparison of the encryption algorithms with respect to various parameters like encryption ratio, speed, compression friendliness, visual degradation and cryptographic security is presented.…”
Section: Figure1 Symmetric Key Encryption/decryption Methodsmentioning
confidence: 99%
“…In , fixed sized key has been used for implementing AES. Video, text, audio, and MPEG‐4 are the data which are going to be encrypted.…”
Section: System For Shaping Aes Algorithmmentioning
confidence: 99%
“…Another study done in [17] has been done to compare the consumption of energy of the different available symmetric key encryption algorithms on handheld devices. It shows that only about 45% of the battery power is remaining when encrypting a file of about 5MB using the 3DES,that means, the no further encryption is [possible after that size of data because the battery died at all.…”
Section: Related Workmentioning
confidence: 99%