Developing a Cryptosystem for Multimedia Data
DOI:
https://doi.org/10.18100/ijamec.09139Keywords:
Cryptography, Encryption, Decryption, RSA.Abstract
The multimedia information is not secure in the wireless systems compared to that of wired systems. So, there is a necessity to encrypt the information and transmit over wireless medium and then receive the encrypted information from the wireless medium to recover the original information using a decryption method. In this paper, we propose a new method of cryptographic algorithm by combining both the symmetric key mono alphabetic shift ciphering and the RSA (Rivest, Shamir, and Adleman) algorithm which can be more applicable to the future generation of wireless systems. We have developed an algorithm for generating the RSA secret keys. The simulation is implemented in MATLAB. The security performance is studied for multimedia data files such as text, audio and image. Since, RSA is based on modular exponentiation, our experimental results show that the proposed algorithm is very efficient and secure for practical implementation as a multimedia cryptosystem.Downloads
References
Behrouz A. Forouzan, “Cryptography and Network Security”, ISBN: 987-007-126361-0, Edition 2008.
Stallings W, "Network Security Essentials", ISBN: 0-13-120271-5, Edition 2003.
Douglas R. Stinson, “Cryptography Theory and Practice”, Chapman & Hall/CRC Press, 3rd Edition, pp. 211-214, 2006.
M. Grangetto, E. Magli, and G. Olmo, “Multimedia selective encryption by means of randomized arithmetic coding,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905–917, Oct. 2006.
Hamdan.O.Alanazi et al., B.B.Zaidan, "New Comparative Study Between DES, 3DES and AES within Nine Factors", JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, ISSN 2151-617, pp. 152-157, Mar 2010.
Vishwa Gupta et al, Advance cryptography algorithm for improving data security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, Jan 2012.
M. Ito, N. Ohnishi, A. Alfalou and A. Mansour, “New image encryption and compression method based on independent component analysis”, IEEE information and communication technologies from theory to application, pp. 1-6, April 2008.
Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244.
Donald L. Schifung, Laurence B. Milstein, Raymond L. Pickholtz, Marvin Kullback, and Frank Miller, “Spread Spectrum for Commercial Communications”, IEEE Comn. Mag., April 1991.
Jianming Wu, et al, A Wireless Multimedia CDMA System Based on Transmission Power Control. In IEEE Journal on selected areas of Comm., Vol. 14, No. 4, pp. 638-644, 1996.
Downloads
Published
Issue
Section
License
Copyright (c) 2015 International Journal of Applied Methods in Electronics and Computers
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.