We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Real Time Digest based ‘Distortion Encryption’ and ‘Restoring Decryption’ Of Multimedia Data in Mobile Phones

by Puneetha B H, Manoj Kumar M.v, Manoj N. Revankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 10
Year of Publication: 2012
Authors: Puneetha B H, Manoj Kumar M.v, Manoj N. Revankar
10.5120/9152-3404

Puneetha B H, Manoj Kumar M.v, Manoj N. Revankar . A Real Time Digest based ‘Distortion Encryption’ and ‘Restoring Decryption’ Of Multimedia Data in Mobile Phones. International Journal of Computer Applications. 57, 10 ( November 2012), 26-29. DOI=10.5120/9152-3404

@article{ 10.5120/9152-3404,
author = { Puneetha B H, Manoj Kumar M.v, Manoj N. Revankar },
title = { A Real Time Digest based ‘Distortion Encryption’ and ‘Restoring Decryption’ Of Multimedia Data in Mobile Phones },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 10 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number10/9152-3404/ },
doi = { 10.5120/9152-3404 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:06.105148+05:30
%A Puneetha B H
%A Manoj Kumar M.v
%A Manoj N. Revankar
%T A Real Time Digest based ‘Distortion Encryption’ and ‘Restoring Decryption’ Of Multimedia Data in Mobile Phones
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 10
%P 26-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

When it comes to era of modern age of computing it is evident that human beings have made their migration from static life style to dynamic lifestyle, i. e. , all users activities will be carried out through usage of mobile. Mobility is totally been involved in all people lifestyles, it is very hard to find the person without a mobile phone, especially in well developed or developing countries. Consider any mobile devices; they are mainly concerned with efficient power (Battery usage), processor time and memory utilization but when comes to security we are lagging behind in providing security to the data present in the mobile [1]. With study across various cryptographic algorithms but all the cryptographic algorithms which all are using, their working is mainly concentrated to work better with desktop applications. There are very least known or no algorithms on cryptography for mobile applications. The available cryptographic algorithms like DES, AES, Triple DES, elliptical curve etc algorithms demand much computational power than mobile devices can provide. In this paper lot concentration has been put for proposing the efficient and 2 layer secured 'distortion encryption' and 'restoring decryption' methods for multimedia data for portable mobile devices especially for images (Multimedia) [2][3].

References
  1. Mobile Code Security in Contemporary Information System –Past, Present and Trends Denis Trcek, Faculty of Computer and Information Science, University of Ljubljana, Trzaska cesta 25, 1000 Ljubljana, Slovenia – EU.
  2. YuChen Dept. of Electr. & Comput. Eng. , SUNY -Binghamton, Binghamton, NY Wei-Shinn Ku, "Self-Encryption Scheme for Data Security in Mobile Devices" Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE.
  3. Types Of Cryptographic Algorithms: http://i. thiyagaraaj. com/tutorials/introduction-of-cryptography/types-of-cryptographic-algorithms
  4. General survey on massive data encryption. Mengmeng Wang North China Univ. of Water Resources & Electr. Power, Zhengzhou, China.
  5. Shankar,T. N. CSE, GMRIT Rajam, Srikakulam, India Sahoo, G. ; Niranjan, S. "Image Encryption for mobile devices", Communication Control and Computing Technologies (ICCCCT), 2010 IEEE International Conference.
  6. MD5: http://en. wikipedia. org/wiki/Md5
  7. Android Operating System: http://en. wikipedia. org/wiki/Android_(operating_system)
Index Terms

Computer Science
Information Sciences

Keywords

Message digest encryption positional digest image distortion encryption restoring decryption