Data (Video) Encryption in Mobile devices

Abstract = 612 times | PDF = 603 times

Main Article Content

Aya Khalid Naji Saad Najim Alsaad


In the development of 3G devices, all elements of multimedia (text, image, audio, and video) are becoming crucial choice for communication. The secured system in 3G devices has become an issue of importance, on which lot of research is going on. The traditional cryptosystem like DES, AES, and RSA do not able to meet with the properties of the new generation of digital mobile devices. This paper presents an implementation of video protection of fully encrypted using Elliptic Curve   Cryptography (ECC) on a mobile device. The Android platform is used for this purpose.  The results refer that the two important criteria of video mobile encryption: the short computation time required and high confidentially are provided.


video encryption, Mobile Application, encryption, decryption, confidentiality, elliptic curve cryptography ECC, prime field, Android platform.


Download data is not yet available.

Article Details


[1] P. Saranya.,M.LVaralakshmi “H.264 based Selective Video Encryption for Mobile Application,” International Journal of Computer Applications, vol. 17, pp. 21-25, 2011.
[2] A.Saad Najim, H.Eman, “A Speech Encryption based on Chaotic Maps,” International Journal of Computer Applications, vol. 93, pp. 19-28, 2014.
[3] M.Danang Tri, Dr. Ir. Rinaldi Munir, M.T., “Secured Video Streaming Development On Smartphones With Android Platform, ” In Proceedings of the IEEE International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp. 340-344, 2012.
[4] S.Laiphrakpam Dolendro, S. Khumanthem Manglem, “Implementation of Text Encryption using Elliptic Curve Cryptography, ” In Proceedings of the Elsevier International Multi-Conference on Information Processing(IMCIP), pp.73-82, 2015.
[5] H.Darrel ,M.Alfred and V.Scott , Guide to Elliptic Curve Cryptography, Springer, 2004.
[6] Y. Salem, "Implementation of Elliptic Curve Cryptography using biometric features to enhance security services," Msc, University Malaya, 2009.
[7] K. Rahouma, “A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem,” 2006. [Online].Available:
[8] D. Sravana Kumar, CH. Suneetha A., ChandrasekhAR, “Encryption of Data Using Elliptic Curve Over Finite Fields,” International Journal of Distributed and Parallel Systems ,vol.3,pp.301-309, 2012.
[9] S. Rahul, C. Ritu, G.Vinit Kumar , and S.Pooja, “Implementation of Elliptic Curve Cryptography for Audio Based Application,” International Journal of Engineering Research & Technology , vol. 3, pp. 2210-2214, 2014.
[10] N.Mayur, S.Avinash, B.Pratik,and M. Chetan, “ Secure and Reliable Data Transfer on Android Mobiles Using AES and ECC Algorithm, ” International Journal of Innovative Technology & Adaptive Management (IJITAM) 2014[Online].Available:
[11] M. Dhananjay, J. Nitin , “ Video Encryption Using AES Algorithm,” In Proceedings of the IEEE International Conference on Current Trends in Engineering and Technology (ICCTET), pp.332-337, 2014.
[12] F. Hadi, “A Modified AES for Mobile Devices,” MSc thesis in Computer Sciences University of Technology, 2015.
[13] A. Kareem, “An Efficient Block Encryption Cipher Based on Chaotic Maps for SecureVideo Applications, ” MSc thesis in Computer Sciences , Al-Mustansiriyah University, 2015.
[14] R. Samih, “MPEG-4 Encryption based on RC6 and RC4,” MSc thesis in Computer Sciences , Al-Mustansiriyah University, 2015.
[15] K.Mankiran, M.Manish, “Enhancing Security in Mobile cloud computing using double-encryption model, ” International Journal of Modern Computer Science , vol. 4, pp. 69-73 , 2016.
[16] H. Zimeng, “Security of Mobile Devices and Wi-Fi Networks,” Bachelor’s Thesis MAMK Unviversity of applied sciences , 2015.
[17] The Statistics Portal (2017).
[18] A.MohdShahdi, M.NurEmyra, N.Rathidevi, H.Rosilah and H.Nor Effendy, “ Comparison Between Android and iOS Operating System in terms of Security,” In Proceedings of the IEEE International Conference on Information Technology in Asia (CITA), 2013.
[19] A.Jeremy,H. Alexander Van’t,and A.Naser, “Cider: Native Execution of iOS Apps on Android, ” in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS),pp.367-381 UT, USA, 2014.
[20] I. Jabbar, “Secure E-Voting System Using Homonrphic Encryption, ” Msc , University of Mustansiryriah, 2016.
[21] C. Paar , J. Pelzl , Understanding Cryptography A Textbook for Students and Practitioners, Springer, 2010.
[22] E.D.Ziad,Y.N Shahrul , and R B O Rozmie r“ A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem, ” Journal of Theoretical and Applied Information Technology, vol. 85, pp. 290-297,2016.
[23] K. Rabah, “Theory and implementation of elliptic curve cryptography,” Journal of Applied Sciences, pp. 604-633, 2005.