Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Journal Title: Iraqi Journal for Computers and Informatics - Year 2017, Vol 43, Issue 1
Abstract
Abstract: With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became easy to attack. In this newspaper, we suggest a model to Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain. The analysis and evaluate the performance of this model is measured by testing several parameters. Show The resulting multimedia is found to be more distorted in hybrid Cipher.
Authors and Affiliations
Kassim Mohammed Awad, Ali Makki Sagheer, Ayoob Abdulmunem Abdulhameed
Enhance the Hiding Image by Using Compression and Securing Techniques
Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed to achieve the security of information and/or network across the world. Cryptography is one of the mo...
Automatic Vehicle Accident Detection Based on GSM System
The evolution of technology has increased the rate of traffic accidents that occurs frequently causing loss of life and property. Therefore, the automatic traffic monitoring system gradually attracted the attention of re...
Blended Learning Using Virtual Reality Environments
Immersive virtual reality isn’t just for gaming. It’s poised to have a big impact on education as well, giving students an opportunity to interact with content in three-dimensional learning environments. Blended learning...
Design of Secure Chatting Application with End to End Encryption for Android Platform
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed applica...
Corners-based Image Information Hiding Method
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this...