메뉴 건너뛰기




Volumn 10, Issue 15, 2010, Pages 1656-1661

Suitability of using symmetric key to secure multimedia data: An overview

Author keywords

Advance encryption standard; Asymmetric key encryption; Data encryption standard; Multimedia security; Symmetric key encryption; Triple data encryption standard

Indexed keywords

DIGITAL COMMUNICATION SYSTEMS; DIGITAL TELEVISION; TELEVISION APPLICATIONS; VIDEO CONFERENCING;

EID: 77954808901     PISSN: 18125654     EISSN: 18125662     Source Type: Journal    
DOI: 10.3923/jas.2010.1656.1661     Document Type: Article
Times cited : (35)

References (20)
  • 3
    • 77954783799 scopus 로고    scopus 로고
    • New framework for high secure data hidden in the MPEG using AES encryption algorithm
    • Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
    • (2009) Int. J. Comput. Electr. Eng. , vol.1 , pp. 566-571
    • Alaa, T.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 8
    • 84915280624 scopus 로고
    • Cryptology goes public
    • Magazine
    • Kahn, D., 1980. Cryptology goes public. IEEE Commnn. Magazine, 4: 19-28.
    • (1980) IEEE Commnn. , vol.4 , pp. 19-28
    • Kahn, D.1
  • 9
    • 77954768373 scopus 로고    scopus 로고
    • Retrieved from (accessed, 20 DES, 2009)
    • Kessler, G.C., 1998. An overview of cryptography. Retrieved from (accessed, 20 DES, 2009). http://www.garykessler.net/library/crypto.html#intro.
    • (1998) An Overview of Cryptography
    • Kessler, G.C.1
  • 11
    • 77952268534 scopus 로고    scopus 로고
    • Challenges of hidden data in the unused area two within executable files
    • Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009a. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
    • (2009) J. Comput. Sci. , vol.5 , pp. 890-897
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 12
    • 77952266986 scopus 로고    scopus 로고
    • Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography
    • Naji, A.W., A.A. Zaidan, B.B. Zaidan, A. Shihab and O.O. Khalifa, 2009b. Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Security, 9: 294-300.
    • (2009) Int. J. Comput. Sci. Network Security , vol.9 , pp. 294-300
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3    Shihab, A.4    Khalifa, O.O.5
  • 13
    • 77954769007 scopus 로고    scopus 로고
    • Theory and implementation of data encryption standard: A Review
    • Rabah, K., 2005a. Theory and implementation of data encryption standard: A review. Inform. Technol. J., 4: 307-325.
    • (2005) Inform. Technol. J. , vol.4 , pp. 307-325
    • Rabah, K.1
  • 14
    • 33644596644 scopus 로고    scopus 로고
    • Theory and implementation of elliptic curve cryptography
    • Rabah, K., 2005b. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
    • (2005) J. Applied Sci. , vol.5 , pp. 604-633
    • Rabah, K.1
  • 15
    • 33646264791 scopus 로고    scopus 로고
    • Implementing secure RSA cryptosystems using your own cryptographic JCE provider
    • Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
    • (2006) J. Applied Sci. , vol.6 , pp. 482-510
    • Rabah, K.1
  • 17
    • 84888281099 scopus 로고    scopus 로고
    • Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standared)
    • Xu, Q.Z. and Y. Dereje, 2004. Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standared). Inform. Technol. J., 3: 49-56.
    • (2004) Inform. Technol. J. , vol.3 , pp. 49-56
    • Xu, Q.Z.1    Dereje, Y.2
  • 18
    • 84888281933 scopus 로고    scopus 로고
    • High securing cover-file of hidden data using statistical technique and AES encryption algorithm
    • Zaidan, A.A., B.B. Zaidan and M. Anas, 2009a. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol, 54: 468-479.
    • (2009) World Acad. Sci. Eng. Technol , vol.54 , pp. 468-479
    • Zaidan, A.A.1    Zaidan, B.B.2    Anas, M.3
  • 19
    • 85015378969 scopus 로고    scopus 로고
    • Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
    • Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, H.K. Ahmed and A.W. Naji, 2009b. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography. Proc. World Cong. Eng., 1: 259-265.
    • (2009) Proc. World Cong. Eng. , vol.1 , pp. 259-265
    • Zaidan, A.A.1    Othman, F.2    Zaidan, B.B.3    Raji, R.Z.4    Ahmed, H.K.5    Naji, A.W.6
  • 20
    • 84888276035 scopus 로고    scopus 로고
    • A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard
    • Zaidan, A.A., B.B. Zaidan, A.H. Jalab, 2010. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
    • (2010) Int. J. Comput. Theory Eng. , vol.2 , pp. 220-227
    • Zaidan, A.A.1    Zaidan, B.B.2    Jalab, A.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.