A resource-efficient encryption algorithm for multimedia big data
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In th...
Saved in:
Published in | Multimedia tools and applications Vol. 76; no. 21; pp. 22703 - 22724 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.11.2017
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks. |
---|---|
AbstractList | Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost. In this paper, we have designed and developed a resource-efficient encryption system for encrypting multimedia big data in IoT. The proposed system takes the advantages of the Feistel Encryption Scheme, an Advanced Encryption Standard (AES), and genetic algorithms. To satisfy high throughput, the GPU has also been used in the proposed system. This system is evaluated on real IoT medical multimedia data to benchmark the encryption algorithms such as MARS, RC6, 3-DES, DES, and Blowfish in terms of computational running time and throughput for both encryption and decryption processes as well as the avalanche effect. The results show that the proposed system has the lowest running time and highest throughput for both encryption and decryption processes and highest avalanche effect with compared to the existing encryption algorithms. To satisfy the security objective, the developed algorithm has better Avalanche Effect with compared to any of the other existing algorithms and hence can be incorporated in the process of encryption/decryption of any plain multimedia big data. Also, it has shown that the classical and modern ciphers have very less Avalanche Effect and hence cannot be used for encryption of confidential multimedia messages or confidential big data. The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50. Therefore, such system is able to secure the multimedia big data against real-time attacks. |
Author | Yassein, Muneer Bani Talafha, We’am Adel Aljawarneh, Shadi |
Author_xml | – sequence: 1 givenname: Shadi surname: Aljawarneh fullname: Aljawarneh, Shadi email: saaljawarneh@just.edu.jo organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology – sequence: 2 givenname: Muneer Bani surname: Yassein fullname: Yassein, Muneer Bani organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology – sequence: 3 givenname: We’am Adel surname: Talafha fullname: Talafha, We’am Adel organization: Faculty of Computer and Information Technology, Jordan University of Science and Technology |
BookMark | eNp9kDtPAzEQhC0UJJLAD6A7idrgtX32XRlFvCQkGqgtn88Oju4RbKe4f4-jo0BIUO0W8-3MzgothnGwCF0DuQVC5F0EIJxiAgJzxhieztASSsmwlBQWeWcVwbIkcIFWMe5JFpaUL9FmUwQbx2MwFlvnvPF2SIUdTJgOyY9DobvdGHz66As3hqI_dsn3tvW6aPyuaHXSl-jc6S7aq--5Ru8P92_bJ_zy-vi83bxgw0AkTJloDGjhuKXatkxw0jjNDXWk0g20pTZOOgG6psZorolgRFguXWXBNBVla3Qz3z2E8fNoY1L7HHvIlgpqXtdlKUmVVTCrTBhjDNapQ_C9DpMCok5NqbkplQtQp6bUlBn5izE-6dP3KWjf_UvSmYzZZdjZ8CPTn9AXaMWAYA |
CitedBy_id | crossref_primary_10_1155_2021_7212688 crossref_primary_10_1007_s11042_019_07796_7 crossref_primary_10_1007_s11042_018_5729_7 crossref_primary_10_1080_03772063_2020_1782781 crossref_primary_10_1007_s10699_019_09593_9 crossref_primary_10_3390_electronics11071083 crossref_primary_10_1007_s10699_019_09595_7 crossref_primary_10_1007_s10586_017_1107_x crossref_primary_10_1007_s11042_022_13933_6 crossref_primary_10_2139_ssrn_3434931 crossref_primary_10_1007_s11042_019_08190_z crossref_primary_10_1088_1742_6596_2010_1_012058 crossref_primary_10_1007_s12083_022_01372_x crossref_primary_10_1371_journal_pone_0293418 crossref_primary_10_1007_s11277_019_06120_8 crossref_primary_10_1016_j_compeleceng_2021_107418 crossref_primary_10_12688_f1000research_72890_1 crossref_primary_10_12688_f1000research_72890_2 crossref_primary_10_4018_IJACI_293148 crossref_primary_10_1166_jmihi_2021_3888 crossref_primary_10_1007_s11042_020_09478_1 crossref_primary_10_1109_ACCESS_2020_2964280 crossref_primary_10_1007_s00521_019_04062_7 crossref_primary_10_1109_ACCESS_2018_2815614 crossref_primary_10_1007_s11042_020_08994_4 crossref_primary_10_3390_app14114341 crossref_primary_10_3390_electronics12132930 crossref_primary_10_12688_f1000research_72890_3 crossref_primary_10_1016_j_jksuci_2020_08_005 crossref_primary_10_1007_s11042_017_4873_9 crossref_primary_10_1515_jisys_2018_0365 crossref_primary_10_2174_2213275912666190103142858 crossref_primary_10_1155_2021_6751423 crossref_primary_10_1007_s10699_019_09588_6 crossref_primary_10_1007_s10699_019_09589_5 crossref_primary_10_1007_s11042_020_09446_9 crossref_primary_10_1002_cmm4_1075 crossref_primary_10_11648_j_advances_20240503_13 crossref_primary_10_3390_s21134419 crossref_primary_10_4018_IJITWE_2019100102 crossref_primary_10_1007_s11042_017_5556_2 crossref_primary_10_1007_s13369_023_07924_4 crossref_primary_10_1007_s11042_019_07852_2 crossref_primary_10_1007_s10699_019_09591_x crossref_primary_10_1007_s11042_020_08823_8 crossref_primary_10_1007_s11042_020_08826_5 crossref_primary_10_1007_s11042_020_08694_z crossref_primary_10_1007_s11042_018_5663_8 |
Cites_doi | 10.1007/s10796-014-9492-7 10.1007/s11036-013-0489-0 10.1016/j.future.2014.10.010 10.1007/s11277-011-0288-5 10.7763/IJFCC.2015.V4.395 10.1016/j.comnet.2010.05.010 10.1109/12.464391 10.1016/j.future.2016.01.020 10.1002/2014EA000044 10.1109/ICoICT.2014.6914043 10.4018/ijcac.2011040105 10.1145/2898445.2898449 10.1109/CyberC.2015.9 10.4028/www.scientific.net/AMM.433-435.1752 10.1109/ISNE.2014.6839375 10.1145/2484028.2494492 10.1109/HPEC.2012.6408660 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2017 Multimedia Tools and Applications is a copyright of Springer, 2017. |
Copyright_xml | – notice: Springer Science+Business Media New York 2017 – notice: Multimedia Tools and Applications is a copyright of Springer, 2017. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
DOI | 10.1007/s11042-016-4333-y |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Global (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 22724 |
ExternalDocumentID | 10_1007_s11042_016_4333_y |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACMFV ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 7SC 7XB 8AL 8FD 8FK ABRTQ JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQGLB PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c316t-236bc1a6f4e2aed3640bfa4c2f08ab1d5acf7f61a92cca4a06306e47f8e1cb823 |
IEDL.DBID | U2A |
ISSN | 1380-7501 |
IngestDate | Sun Jul 13 04:13:50 EDT 2025 Tue Jul 01 02:06:41 EDT 2025 Thu Apr 24 22:53:14 EDT 2025 Fri Feb 21 02:32:04 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 21 |
Keywords | Multimedia big data Internet of things Encryption GPU AES |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-236bc1a6f4e2aed3640bfa4c2f08ab1d5acf7f61a92cca4a06306e47f8e1cb823 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1949955708 |
PQPubID | 54626 |
PageCount | 22 |
ParticipantIDs | proquest_journals_1949955708 crossref_primary_10_1007_s11042_016_4333_y crossref_citationtrail_10_1007_s11042_016_4333_y springer_journals_10_1007_s11042_016_4333_y |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20171100 2017-11-00 20171101 |
PublicationDateYYYYMMDD | 2017-11-01 |
PublicationDate_xml | – month: 11 year: 2017 text: 20171100 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2017 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | CR19 CR15 CR14 CR13 Atzori, Iera, Morabito (CR3) 2010; 54 CR11 Li, Da Xu, Zhao (CR16) 2015; 17 Aljawarneh (CR1) 2011; 1 CR10 Elminaam, Abdual-Kader, Hadhoud (CR7) 2010; 10 Schweitzer, Boleng (CR22) 2009; 25 CR30 Aljawarneh, Raja, Abdelsalam (CR2) 2016; 60 CR6 CR8 CR28 Hart, Martinez (CR9) 2015; 2 CR27 CR25 CR24 CR23 Madakam (CR17) 2015; 4 CR21 CR20 Mahalle, Anggorojati, Prasad, Prasad (CR18) 2013; 1 Bandyopadhyay, Sen (CR4) 2011; 58 Kalyani, Gaur, Vats (CR12) 2015; 2 Yao, Chen, Tian (CR29) 2015; 49 Chen, Shiwen, Yunhao (CR5) 2014; 19 Tavares, Heys (CR26) 1995; 44 X Yao (4333_CR29) 2015; 49 D Schweitzer (4333_CR22) 2009; 25 S Madakam (4333_CR17) 2015; 4 S Aljawarneh (4333_CR1) 2011; 1 4333_CR20 4333_CR21 4333_CR24 4333_CR23 V Kalyani (4333_CR12) 2015; 2 4333_CR25 4333_CR28 4333_CR8 4333_CR27 J Hart (4333_CR9) 2015; 2 4333_CR6 DS Elminaam (4333_CR7) 2010; 10 D Bandyopadhyay (4333_CR4) 2011; 58 S Aljawarneh (4333_CR2) 2016; 60 4333_CR30 4333_CR11 4333_CR10 4333_CR13 L Atzori (4333_CR3) 2010; 54 4333_CR15 4333_CR14 4333_CR19 S Li (4333_CR16) 2015; 17 PN Mahalle (4333_CR18) 2013; 1 M Chen (4333_CR5) 2014; 19 SE Tavares (4333_CR26) 1995; 44 |
References_xml | – volume: 2 start-page: 2394 year: 2015 end-page: 8124 ident: CR12 article-title: IoT: ‘machine to machine’ application a future vision publication-title: J Manag Eng Inf Technol (JMEIT) – volume: 1 start-page: 64 issue: 2 year: 2011 end-page: 70 ident: CR1 article-title: Cloud security engineering: avoiding security threats the right way publication-title: Int J Cloud Appl Comput (IJCAC) – volume: 17 start-page: 243 year: 2015 end-page: 259 ident: CR16 article-title: The internet of things: a survey publication-title: Inf Syst Front doi: 10.1007/s10796-014-9492-7 – volume: 25 start-page: 39 year: 2009 end-page: 45 ident: CR22 article-title: Designing web labs for teaching security concepts publication-title: J Comput Sci Coll – volume: 19 start-page: 171 year: 2014 end-page: 209 ident: CR5 article-title: Big data: a survey publication-title: Mob Netw Appl doi: 10.1007/s11036-013-0489-0 – ident: CR14 – ident: CR30 – ident: CR10 – ident: CR6 – volume: 49 start-page: 104 year: 2015 end-page: 112 ident: CR29 article-title: A lightweight attribute-based encryption scheme for the internet of things publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2014.10.010 – ident: CR8 – volume: 10 start-page: 216 year: 2010 end-page: 222 ident: CR7 article-title: Evaluating the performance of symmetric encryption algorithms publication-title: IJ Netw Secur – ident: CR25 – ident: CR27 – ident: CR23 – ident: CR21 – ident: CR19 – volume: 58 start-page: 49 year: 2011 end-page: 69 ident: CR4 article-title: Internet of things: applications and challenges in technology and standardization publication-title: Wirel Pers Commun doi: 10.1007/s11277-011-0288-5 – ident: CR15 – volume: 4 start-page: 250 year: 2015 end-page: 253 ident: CR17 article-title: Internet of things: smart things publication-title: Int J Future Comput Commun doi: 10.7763/IJFCC.2015.V4.395 – volume: 54 start-page: 2787 year: 2010 end-page: 2805 ident: CR3 article-title: Internet of things: a survey publication-title: Comput Netw doi: 10.1016/j.comnet.2010.05.010 – volume: 44 start-page: 1131 year: 1995 end-page: 1139 ident: CR26 article-title: Avalanche characteristics of substitution-permutation encryption networks publication-title: IEEE Trans Comput doi: 10.1109/12.464391 – ident: CR13 – volume: 60 start-page: 67 year: 2016 end-page: 77 ident: CR2 article-title: Investigations of automatic methods for detecting the polymorphic worms signatures publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2016.01.020 – ident: CR11 – volume: 2 start-page: 194 year: 2015 end-page: 200 ident: CR9 article-title: Toward an environmental internet of things publication-title: AGU Earth Space Sci doi: 10.1002/2014EA000044 – volume: 1 start-page: 309 year: 2013 end-page: 348 ident: CR18 article-title: Identity authentication and capability-based access control (IACAC) for the internet of things publication-title: J Cyber Secur Mob – ident: CR28 – ident: CR24 – ident: CR20 – ident: 4333_CR19 doi: 10.1109/ICoICT.2014.6914043 – ident: 4333_CR24 – volume: 10 start-page: 216 year: 2010 ident: 4333_CR7 publication-title: IJ Netw Secur – volume: 54 start-page: 2787 year: 2010 ident: 4333_CR3 publication-title: Comput Netw doi: 10.1016/j.comnet.2010.05.010 – ident: 4333_CR8 – ident: 4333_CR20 – volume: 2 start-page: 194 year: 2015 ident: 4333_CR9 publication-title: AGU Earth Space Sci doi: 10.1002/2014EA000044 – volume: 60 start-page: 67 year: 2016 ident: 4333_CR2 publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2016.01.020 – volume: 25 start-page: 39 year: 2009 ident: 4333_CR22 publication-title: J Comput Sci Coll – ident: 4333_CR11 – volume: 1 start-page: 64 issue: 2 year: 2011 ident: 4333_CR1 publication-title: Int J Cloud Appl Comput (IJCAC) doi: 10.4018/ijcac.2011040105 – ident: 4333_CR13 doi: 10.1145/2898445.2898449 – ident: 4333_CR21 – ident: 4333_CR28 doi: 10.1109/CyberC.2015.9 – volume: 17 start-page: 243 year: 2015 ident: 4333_CR16 publication-title: Inf Syst Front doi: 10.1007/s10796-014-9492-7 – ident: 4333_CR25 – volume: 44 start-page: 1131 year: 1995 ident: 4333_CR26 publication-title: IEEE Trans Comput doi: 10.1109/12.464391 – volume: 49 start-page: 104 year: 2015 ident: 4333_CR29 publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2014.10.010 – volume: 4 start-page: 250 year: 2015 ident: 4333_CR17 publication-title: Int J Future Comput Commun doi: 10.7763/IJFCC.2015.V4.395 – ident: 4333_CR30 doi: 10.4028/www.scientific.net/AMM.433-435.1752 – volume: 2 start-page: 2394 year: 2015 ident: 4333_CR12 publication-title: J Manag Eng Inf Technol (JMEIT) – volume: 58 start-page: 49 year: 2011 ident: 4333_CR4 publication-title: Wirel Pers Commun doi: 10.1007/s11277-011-0288-5 – ident: 4333_CR10 – volume: 1 start-page: 309 year: 2013 ident: 4333_CR18 publication-title: J Cyber Secur Mob – volume: 19 start-page: 171 year: 2014 ident: 4333_CR5 publication-title: Mob Netw Appl doi: 10.1007/s11036-013-0489-0 – ident: 4333_CR14 – ident: 4333_CR15 doi: 10.1109/ISNE.2014.6839375 – ident: 4333_CR6 – ident: 4333_CR23 doi: 10.1145/2484028.2494492 – ident: 4333_CR27 doi: 10.1109/HPEC.2012.6408660 |
SSID | ssj0016524 |
Score | 2.509304 |
Snippet | Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 22703 |
SubjectTerms | Algorithms Avalanches Big Data Computer Communication Networks Computer Science Data encryption Data management Data Structures and Information Theory Encryption Genetic algorithms Internet Messages Multimedia Multimedia Information Systems Run time (computers) Special Purpose and Application-Based Systems |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTwIxEJ4oXPTgAzWiaHrwpGncdnfLcjJoIMREYowk3DZtt0UTBAQ88O_tLF1AEz1vt8nOtPPNzuMbgCvsym1w5X5LQhHQSKiEqgwD-TKwUmrlEALjHU9d0elFj_247wNuM19WWdjE3FBnY40x8luGLCrIF5XcTT4pTo3C7KofobENZWeCk6QE5ftW9_lllUcQsR9rmwTUYSMr8pp58xzD1hS3BruGQrr4iUxrd_NXhjQHnvYB7HmPkTSXKj6ELTOqwH4xjYH4y1mB3Q1qwSNoNsnUR-apyWkiHLoQt3K6yI0EkcOB-7z52wdxbivJ6wrzLhKi3gcE60aPodduvT50qB-XQHXIxJzyUCjNpLCR4dJkoYgCZWWkuQ0SqVgWS23rVjDZ4E5tkUS2LWGiuk0Mc0rh4QmURuOROQXSCJVz5RxUhRrJZrQ0jHPFbRYbnmkbVCEoRJVqzyWOIy2G6ZoFGaWbYv0YSjddVOF69cpkSaTx3-JaIf_U36lZuj4BVbgpdLLx-K_Nzv7f7Bx2OEJ13l9Yg9J8-mUunKMxV5f-NH0DjhzPVw priority: 102 providerName: ProQuest |
Title | A resource-efficient encryption algorithm for multimedia big data |
URI | https://link.springer.com/article/10.1007/s11042-016-4333-y https://www.proquest.com/docview/1949955708 |
Volume | 76 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH4RuOjBH6gRRdKDJ82StdvKOA7Dj2gkxkiCp6XtWiRBMIAH_nv7xgZo1MRTD-t6eG_t99b3vu8BXCErt8Gk_S3xuOv4XIaOTPAiX7hGCCUtQuB9x0OPd_v-3SAYZDzueV7tnqck05N6Q3ajSCWxIQqyfDxnWYBSYH_dsY6rz6J16oAHWSfb0HUsHNI8lfnTEl_BaBNhfkuKpljTPoT9LEgk0cqrR7CjJ2U4yBswkGw_lmFvS03wGKKIzLLLeEenyhAWUIidOVum5wIR4-F0Nlq8vhEbqZK0lDAljhA5GhIsFT2Bfrv1fNt1sg4JjvIoXzjM41JRwY2vmdCJx31XGuErZtxQSJoEQpm64VQ0mPWUL1Bgi2u_bkJNrR-YdwrFyXSiz4A0PGmjN4tOnkJ9GSU0ZUwykwSaJcq4FXBzU8Uqkw_HLhbjeCN8jNaNsWQMrRsvK3C9fuV9pZ3x1-Rqbv8420bzmKJ0DoqEhRW4yX2y9fi3xc7_NfsCdhmCdcowrEJxMfvQlzbUWMgaFMJ2pwalqN1s9nDsvNy37Nhs9R6faumH9wlK19Bc |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLYQHIADb8R45gAXUESTdqE7IDQBYzxPIHErSZoMJBgwhtD-FL8RO2sZIMGNc9OodRzbif19BlgnVG5NGjyWxCriiTIpNzld5OvIa20Negi67zi_UM2r5OS6ej0E7yUWhsoqS5sYDHX-aOmOfFsQiwrxRaV7T8-cukZRdrVsodFXi1PXe8Mj28vu8QGu74aUjcPL_SYvugpwGwvV5TJWxgqtfOKkdnmsksh4nVjpo1QbkVe19TteCV2T-HeJJlIq5ZIdnzqB305EB2jyR5IYPTkh0xtHn1kLVS2a6KYRR08syixqgOoJAsLgGMIoxbz33Q8Ogtsf-djg5hpTMFHEp6zeV6hpGHLtGZgsez-wwhTMwPgXIsNZqNdZp8gDcBdIKdCXMRzZ6QWTxPR9C4XZvX1gGCSzUMUYMCvM3LUYVanOwdW_iHEehtuPbbcArBYbDBzRMcaWqG2sdkJKI31edTK3PqpAVIoqswVzOTXQuM8GnMsk3Yyq1Ui6Wa8Cm5-vPPVpO_4avFzKPyt28Es20LcKbJVr8uXxb5Mt_j3ZGow2L8_PsrPji9MlGJMUJARk4zIMdzuvbgVDnK5ZDXrF4Oa_FfkDXRYMqA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTyMxDLZQkdDugeeuKM8c4MIqYpKZptMDQuVR8azQapG4zSaZpCBBgVKE-tf4ddjTDAUkuHGeTKQ4ju3E_j4DrBEqtyENXktiFfFEmZSbnB7ydeS1tgY9BL13nLbVwXlydFG7GIPnEgtDZZWlTSwMdX5r6Y18UxCLCvFFpZs-lEWc7bW27-45dZCiTGvZTmOoIsdu8ITXt4etwz3c63UpW_v_dg946DDAbSxUn8tYGSu08omT2uWxSiLjdWKlj1JtRF7T1te9ErohcaWJJoIq5ZK6T53AdRDpAZr_8TrdiiowvrPfPvv7msNQtdBSN404-mVR5lQL4J4gWAyOIcRSzAfvveIo1P2QnS2cXmsaJkO0yppD9ZqBMdedhamyEwQLhmEWfr6hNZyDZpP1QlaAu4KiAj0bw5G9QWGgmL7uoDj7lzcMQ2ZW1DQWCBZmrjqMalZ_wfm3CPI3VLq3XTcPrBEbDCPRTcaWiG6sdkJKI31eczK3PqpCVIoqs4HHnNppXGcjBmaSbka1ayTdbFCFjddf7oYkHl8NXirln4Xz_JCNtK8Kf8o9efP5s8kWvp5sFSZQibOTw_bxIvyQFDEUMMclqPR7j24Z452-WQmKxeD_d-vyC0l-Ejo |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+resource-efficient+encryption+algorithm+for+multimedia+big+data&rft.jtitle=Multimedia+tools+and+applications&rft.au=Aljawarneh%2C+Shadi&rft.au=Yassein%2C+Muneer+Bani&rft.au=Talafha%2C+We%E2%80%99am+Adel&rft.date=2017-11-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=76&rft.issue=21&rft.spage=22703&rft.epage=22724&rft_id=info:doi/10.1007%2Fs11042-016-4333-y&rft.externalDocID=10_1007_s11042_016_4333_y |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |