Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview

Mohamed Abomhara, Othman O. Khalifa, Omar Zakaria, A.A. Zaidan, B.B. Zaidan and Hamdan O. Alanazi

Journal of Applied Sciences, 2010, 10(15), 1656-1661.

Abstract

With the increasing and continuous use of digital communications on the internet in recent times, security is becoming more and more relevant and important. However, special and reliable security is required for the many digital applications available such as video conferencing, digital television and mobile TV. The classical techniques of data security are not appropriate for the current multimedia usage. This study addresses the current algorithm of multimedia encryption schemes that have been proposed in the literature and description of multimedia security. It is a comparative study between symmetric key encryption and asymmetric key encryption in achieving an efficient, flexible and secure video data.

ASCI-ID: 35-3553

Cited References Fulltext

Cited By


An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael

Journal of Applied Sciences, 2010, 10(18), 2161. DOI: 10.3923/jas.2010.2161.2167

Secure Topology for Electronic Medical Record Transmissions

International Journal of Pharmacology, 2010, 6(6), 954. DOI: 10.3923/ijp.2010.954.958

Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns

International Journal of Pharmacology, 2011, 7(3), 382. DOI: 10.3923/ijp.2011.382.387

A Review on Multimedia Communications Cryptography

Research Journal of Information Technology, 2011, 3(3), 146. DOI: 10.3923/rjit.2011.146.152

Two-layer Cellular Automata Based Cryptography

Trends in Applied Sciences Research, 2012, 7(1), 68. DOI: 10.3923/tasr.2012.68.77

Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review

Journal of Medical Systems, 2018, 42(12), . DOI: 10.1007/s10916-018-1104-5

Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review

Journal of Medical Systems, 2018, 42(12), . DOI: 10.1007/s10916-018-1103-6

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

Journal of Medical Systems, 2019, 43(2), . DOI: 10.1007/s10916-018-1149-5

Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review

Journal of Medical Systems, 2019, 43(3), . DOI: 10.1007/s10916-019-1158-z

Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard

Journal of Medical Systems, 2019, 43(7), . DOI: 10.1007/s10916-019-1264-y

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication

Computer Standards & Interfaces, 2019, (), 103343. DOI: 10.1016/j.csi.2019.04.002

New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity

IEEE Access, 2019, 7(), 168994. DOI: 10.1109/ACCESS.2019.2949622

SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider

Multimedia Tools and Applications, 2019, (), . DOI: 10.1007/s11042-019-08330-5

Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures

IEEE Access, 2020, 8(), 9821. DOI: 10.1109/ACCESS.2020.2964788