Multimedia Security Using Encryption: A Survey

Faculty Computer Science Year: 2023
Type of Publication: ZU Hosted Pages:
Authors:
Journal: IEEE Access IEEE Volume: 11
Keywords : Multimedia Security Using Encryption: , Survey    
Abstract:
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they allow for the secure sharing of multimedia content on digital platforms. This survey aims to review the state of secure and privacy-preserving encryption schemes applicable to digital multimedia, such as digital images, digital video, and digital audio. An extensive analysis of the existing cryptography schemes and multimedia encryption algorithms will be conducted to give an extensive overview of the current state of security encryption schemes specifically designed for digital multimedia technology. The survey results will be used to understand better the effectiveness and reliability of secure multimedia encryption schemes and contribute to developing efficient and secure encryption schemes in the future.
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet