A Survey for Performance Analysis Various Cryptography Techniques Digital Contents
نویسندگان
چکیده
In the recent years, with the development of network and multimedia technology, multimedia data, especially image, audio and video data, is used more and more widely in human society. Some multimedia data, including entertainment, politics, economics, militaries, industries, education etc, are necessary to be protected by providing confidentiality, integrity, and ownership or identity. In this regard, to protect multimedia contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications. However, number theory or algebraic concepts based traditional ciphers, such as Data Encryption Standard (DES) (Tuchman, 1997), Advanced Encryption Standard (AES) (Zeghid et al., 1996), International Data Encryption Algorithm (IDEA) (Dang & Chau, 2000), and the algorithm developed by Rivest, Shamir and Adleman (RSA) (Cormen et al., 2001), most of which are used for text or binary data, appear not to be ideal for multimedia applications.
منابع مشابه
مدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملAn Overview of Visual Cryptography based Video Watermarking Schemes: Techniques and Performance Comparison
Digital communication has seen exponential growth in the past decade. Consequently, the security of digital data has become a field of extensive research since piracy and unauthorized use of such data is prevalent because of the ease with which data can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic technique where decryption is done by an authorized user by simp...
متن کاملSurvey and Analysis of Various Steganographic Techniques
Steganography is a method of secret communication that hides the existence of hidden message. The hidden message can be text, image, audio, video, etc. The innocent files can be a cover image after inserting the message into the cover image using stego-key, it is reffered to as stego-image. Steganography becomes more important due to the exponential growth and secret communication of potential ...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملEfficient Techniques for Securing Digital Video Data
With fast developments in digital media and communication, transmission of video data over Internet is unsecured due to various security threats. Digital video should be encrypted using any of the cryptographic methods in order to prevent security threats. Cryptography is used for encrypting and decrypting the digital data. Traditional cryptographic systems are often not enough for fast transmi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015