Suitability of using symmetric key to secure multimedia data: an overview,
With the increasing and continuous use of digital communications on the internet in recent times, security is becoming more and more relevant and important. However, special and reliable security is required for the many digital applications available such as video conferencing, digital television a...
| Main Authors: | Abomhara, Mohamed, Khalifa, Othman Omran, Zakaria, Omar, Zaidan, A. A., Zaidan, B. B., Alanazi, Hamdan O. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5618/ http://irep.iium.edu.my/5618/1/1656-1661.pdf |
Similar Items
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
by: Abomhara, Mohamed, et al.
Published: (2011)
by: Abomhara, Mohamed, et al.
Published: (2011)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010)
by: Alanazi, Hamdan O., et al.
Published: (2010)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools
by: Zaidan , A. A., et al.
Published: (2015)
by: Zaidan , A. A., et al.
Published: (2015)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Development of multimedia modules for student-centered learning
by: Abdul Wahab, Zaidan, et al.
Published: (2002)
by: Abdul Wahab, Zaidan, et al.
Published: (2002)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Golay codec: an overview
by: Khalifa, Othman Omran
Published: (2011)
by: Khalifa, Othman Omran
Published: (2011)
Reed-Muller codes: an overview
by: Khalifa, Othman Omran
Published: (2011)
by: Khalifa, Othman Omran
Published: (2011)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Multimedia security and the internet
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Community managed alcohol programs in Canada: Overview of key dimensions and implementation
by: Pauly, B., et al.
Published: (2018)
by: Pauly, B., et al.
Published: (2018)
Secure data communication using blind source separation
by: Kumar, Anil, et al.
Published: (2008)
by: Kumar, Anil, et al.
Published: (2008)
Digital watermarking : an overview
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2022)
by: Qahtan, Sarah, et al.
Published: (2022)
The suitability of the dendritic cell algorithm for robotic security applications
by: Oates, Robert Foster
Published: (2010)
by: Oates, Robert Foster
Published: (2010)
An examination of Mortgage-Backed Securities: are they suitable for investors to invest
by: Li, Jinghan
Published: (2007)
by: Li, Jinghan
Published: (2007)
An overview of learning content in MyLexics (an assistive multimedia courseware for dyslexics)
by: Mohd. Yusoh, Zeratul Izzah, et al.
Published: (2008)
by: Mohd. Yusoh, Zeratul Izzah, et al.
Published: (2008)
A Case Study Of Multimedia University's Security Management
by: Arumugam, Kesavan A.
Published: (2005)
by: Arumugam, Kesavan A.
Published: (2005)
Similar Items
-
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010) -
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011) -
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
by: Abomhara, Mohamed, et al.
Published: (2011) -
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010) -
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)