You are on page 1of 1

submitted for MTH217 project

Submitted to :
Prof. Ahmed G.Radwan
Dr. Samah El-Tantawy

Be Careful! You have been Hacked


ABSTRACT ALGORITHM ANALYSIS & RESULTS
Everything in our life depends on Math; There is a lot of encryption algorithms, We simulated our project on MATLAB
Encryption is a good application of linear here is a comparison between the most by inserting the video, MATLAB code
algebra and other mathematical topics. popular algorithms: encrypted the video images and the
audio then merged them.
Video encryption is an important branch DES AES IDEA
of data encryption or “multimedia Frames:
security” field which interests in Developed 1977 2000 1990
protection of data and information. 128, 192, or
Key Length 56 bits 128 bits
256 bits
INTROUDUCTION
Symmetric Symmetric Substitution
There is a huge number of videos Structure block block Permutation
transfer between users in networks and cipher cipher Structure Original frames Encrypted frames
the problem is how to make these video Block Size 64 bits 128 bits 64 bits
transfer safely, Video encryption is a very
substantial part of multimedia security Proven Considered
Security
and is used in a lot of applications which inadequate secure
required a high standard of security.
RC4 ALGORITHM
Decrypted frames
RC4 is a stream cipher algorithm, based
on the usage of a random permutation. Audio:
We use in our project RC4 algorithm
Because:
1-It is very fast. 2-More secure.
KSA
VIDEO ENCRYPTION PROCESS 𝒇𝒐𝒓 𝒊 = 𝟎 𝒕𝒐 𝟐𝟓𝟓 𝒅𝒐
Because the video is a combination of " S[i] = i; "
𝑻[𝒊] = 𝑲[𝒊 𝒎𝒐𝒅(|𝑲|)])
images and audio, the process steps are
𝒋 = 𝟎
as follows : 𝒇𝒐𝒓 𝒊 = 𝟎 𝒕𝒐 𝟐𝟓𝟓 𝒅𝒐
𝒋 = (𝒋 + 𝑺[𝒊] + 𝑻[𝒊])(𝒎𝒐𝒅 𝟐𝟓𝟔)
𝒔𝒘𝒂𝒑 (𝑺[𝒊], 𝑺[𝒋]) APPLICATIONS
PRGA • Video Conferencing.
𝒊 = 𝒋 = 𝟎
𝑾𝒉𝒊𝒍𝒆 (𝒎𝒐𝒓𝒆_𝒃𝒚𝒕𝒆_𝒕𝒐_𝒆𝒏𝒄𝒓𝒚𝒑𝒕) • Surveillance.
𝒊 = (𝒊 + 𝟏) (𝒎𝒐𝒅 𝟐𝟓𝟔)
𝒋 = (𝒋 + 𝑺[𝒊]) (𝒎𝒐𝒅 𝟐𝟓𝟔) • VDD.
References
𝒔𝒘𝒂𝒑(𝑺[𝒊], 𝑺[𝒋])
𝒌 = (𝑺[𝒊] + 𝑺[𝒋]) (𝒎𝒐𝒅 𝟐𝟓𝟔) • Pay-Tv News
𝑪𝒊 = 𝑴𝒊 𝑿𝑶𝑹 𝑺[𝒌]

CONCLUSION & FUTURE WORKS


Video Encryption process improves a
lot of applications which depend on
transferring videos between different
devices and provide them with a high
level of security.
Now, researches are working on a new
types of data encryption algorithms like
Quantum cryptography, Honey
encryption, Functional encryption and
Fully homomorphic encryption where
data will be uploaded into a cloud. No
one will be able to access it.

BY REFRENCES
Alaa Osama 1."Symmetric vs. Asymmetric Encryption – What are differences?", SSL2BUY Wiki - Get
Solution for SSL Certificate Queries, 2017
Esraa Amr
Esraa Khaled 2. P. Generation and Stallings, "PRINCIPLES OF PSEUDORANDOM NUMBER
GENERATION", BrainKart, 2017.
Esraa M.Abd El Fatah
3. A. Mousa and A. Hamad, Evaluation of the RC4 Algorithm for Data Encryption. Nablus,
Esraa M.Ismail Palestine: PalTel Company, 2016, pp. 44-51. 226-231

You might also like