Developing a Cryptosystem for Multimedia Data

Authors

  • Abdelsalam Abdelhamid ALMARIMI
  • Ibrahim Ali ALMERHAG
  • Farag ABDULAZIZ

DOI:

https://doi.org/10.18100/ijamec.09139

Keywords:

Cryptography, Encryption, Decryption, RSA.

Abstract

The multimedia information is not secure in the wireless systems compared to that of wired systems. So, there is a necessity to encrypt the information and transmit over wireless medium and then receive the encrypted information from the wireless medium to recover the original information using a decryption method. In this paper, we propose a new method of cryptographic algorithm by combining both the symmetric key mono alphabetic shift ciphering and the RSA (Rivest, Shamir, and Adleman) algorithm which can be more applicable to the future generation of wireless systems. We have developed an algorithm for generating the RSA secret keys. The simulation is implemented in MATLAB. The security performance is studied for multimedia data files such as text, audio and image. Since, RSA is based on modular exponentiation, our experimental results show that the proposed algorithm is very efficient and secure for practical implementation as a multimedia cryptosystem.

Downloads

Download data is not yet available.

References

Behrouz A. Forouzan, “Cryptography and Network Security”, ISBN: 987-007-126361-0, Edition 2008.

Stallings W, "Network Security Essentials", ISBN: 0-13-120271-5, Edition 2003.

Douglas R. Stinson, “Cryptography Theory and Practice”, Chapman & Hall/CRC Press, 3rd Edition, pp. 211-214, 2006.

M. Grangetto, E. Magli, and G. Olmo, “Multimedia selective encryption by means of randomized arithmetic coding,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905–917, Oct. 2006.

Hamdan.O.Alanazi et al., B.B.Zaidan, "New Comparative Study Between DES, 3DES and AES within Nine Factors", JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, ISSN 2151-617, pp. 152-157, Mar 2010.

Vishwa Gupta et al, Advance cryptography algorithm for improving data security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, Jan 2012.

M. Ito, N. Ohnishi, A. Alfalou and A. Mansour, “New image encryption and compression method based on independent component analysis”, IEEE information and communication technologies from theory to application, pp. 1-6, April 2008.

Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244.

Donald L. Schifung, Laurence B. Milstein, Raymond L. Pickholtz, Marvin Kullback, and Frank Miller, “Spread Spectrum for Commercial Communications”, IEEE Comn. Mag., April 1991.

Jianming Wu, et al, A Wireless Multimedia CDMA System Based on Transmission Power Control. In IEEE Journal on selected areas of Comm., Vol. 14, No. 4, pp. 638-644, 1996.

Downloads

Published

02-12-2015

Issue

Section

Research Articles

How to Cite

[1]
“Developing a Cryptosystem for Multimedia Data”, J. Appl. Methods Electron. Comput., vol. 3, no. 4, pp. 223–225, Dec. 2015, doi: 10.18100/ijamec.09139.

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)