An efficient AES and blowfish based video data encryption

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Word-Based AES Encryption Without Data Expansion

Generally, AES is typical encryption algorithm to support the security service of any mobile applications. However, AES cannot encrypt the short sensory data of partial block without data expansion, which is often in the mobile sensing application environments. In this paper, a word-based AES cipher, AESw, is proposed by modifying the AES to make it fit for encrypting the arbitrary message in 3...

متن کامل

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm

Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient platform for simulating complicated systems and performing complex computation based on the neighborhoods information. CA consists of two components 1) a set of cells and 2) a set of rules . Programmable Cellular Automata(PCA) employs some control signals on a Cellular Automata(CA) structure. Progr...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

An Efficient Data Protection Architecture Based on Fragmentation and Encryption

In this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine T...

متن کامل

Protecting Data in Cloud Storage Using Blowfish Encryption Algorithm and Image-Based One-Time Password

One of the primary usage of cloud computing is data storage. Cloud provides huge capacity of storage for cloud user’. To store and retrieve their data at anytime or anywhere it should be reliable and flexible. Currently many enterprises have started using cloud storage due to its advantages. But the problem lie in data security, data privacy and other data protection issues. It is a major setba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACCENTS Transactions on Information Security

سال: 2018

ISSN: 2455-7196

DOI: 10.19101/tis.2018.310001