Reference Hub2
A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing

A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing

Raya Basil Alothman, Imad Ibraheem Saada, Basma Salim Bazel Al-Brge
Copyright: © 2022 |Volume: 24 |Issue: 2 |Pages: 18
ISSN: 1548-7717|EISSN: 1548-7725|EISBN13: 9781799878216|DOI: 10.4018/JCIT.20220101.oa1
Cite Article Cite Article

MLA

Alothman, Raya Basil, et al. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing." JCIT vol.24, no.2 2022: pp.1-18. http://doi.org/10.4018/JCIT.20220101.oa1

APA

Alothman, R. B., Saada, I. I., & Al-Brge, B. S. (2022). A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing. Journal of Cases on Information Technology (JCIT), 24(2), 1-18. http://doi.org/10.4018/JCIT.20220101.oa1

Chicago

Alothman, Raya Basil, Imad Ibraheem Saada, and Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing," Journal of Cases on Information Technology (JCIT) 24, no.2: 1-18. http://doi.org/10.4018/JCIT.20220101.oa1

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

When data exchange advances through the electronic system, the need for information security has become a must. Protection of images and videos is important in today's visual communication system. Confidential image / video data must be shielded from unauthorized uses. Detecting and identifying unauthorized users is a challenging task. Various researchers have suggested different techniques for securing the transfer of images. In this research, the comparative study of these current technologies also addressed the types of images / videos and the different techniques of image / video processing with the steps used to process the image or video. This research classifies the two types of Encryption Algorithm, Symmetric and Encryption Algorithm, and provides a comparative analysis of its types, such as AES, MAES, RSA, DES, 3DES and BLOWFISH.