AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
Adaptive key generation algorithm based on software engineering methodology IJECEIAES
Recently, the generation of security keys has been considered for guaranteeing the strongest of them in terms of randomness. In addition, the software engineering methodologies are adopted to ensure the mentioned goal is reached. In this paper, an adaptive key generation algorithm is proposed based on software engineering techniques. The adopted software engineering technique is self-checking process, used for detecting the fault in the underlying systems. This technique checks the generated security keys in terms of validity based on randomness factors. These factors include the results of National Institute of Standard Test (NIST) tests. In case the randomness factors are less than the accepted values, the key is regenerated until obtaining the valid one. It is important to note that the security keys are generated using shift register and SIGABA technique. The proposed algorithm is tested over different case studies and the results show the effective performance of it to produce well random generated keys.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
Power analysis attack against encryption devices: a comprehensive analysis of...TELKOMNIKA JOURNAL
Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Features of genetic algorithm for plain text encryption IJECEIAES
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Image encryption using jumbling saltingMauryasuraj98
In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
The concept of motion image based wireless monitoring and control system, the main requirements from the M2M communities and related encryption method of the wireless system are described. Section I is the introduction of M2M system, section II is the concept for the scrambling of motion image based video signals with transcendental number that is iterated over Fibonacci prime number sequence, with video time stamp and user pass phrase ...
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
Adaptive key generation algorithm based on software engineering methodology IJECEIAES
Recently, the generation of security keys has been considered for guaranteeing the strongest of them in terms of randomness. In addition, the software engineering methodologies are adopted to ensure the mentioned goal is reached. In this paper, an adaptive key generation algorithm is proposed based on software engineering techniques. The adopted software engineering technique is self-checking process, used for detecting the fault in the underlying systems. This technique checks the generated security keys in terms of validity based on randomness factors. These factors include the results of National Institute of Standard Test (NIST) tests. In case the randomness factors are less than the accepted values, the key is regenerated until obtaining the valid one. It is important to note that the security keys are generated using shift register and SIGABA technique. The proposed algorithm is tested over different case studies and the results show the effective performance of it to produce well random generated keys.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
Power analysis attack against encryption devices: a comprehensive analysis of...TELKOMNIKA JOURNAL
Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Features of genetic algorithm for plain text encryption IJECEIAES
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Image encryption using jumbling saltingMauryasuraj98
In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
The concept of motion image based wireless monitoring and control system, the main requirements from the M2M communities and related encryption method of the wireless system are described. Section I is the introduction of M2M system, section II is the concept for the scrambling of motion image based video signals with transcendental number that is iterated over Fibonacci prime number sequence, with video time stamp and user pass phrase ...
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Mateus S. H. Cruz
Presentation given at the SWIM seminar (University of Tsukuba) about the paper "Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee"*.
This presentation is based on the uploader's understanding of the paper and may contain inaccurate interpretations.
A summary of the paper is available at: https://mshcruz.wordpress.com/2016/10/24/summary-inverted-index-based-multi-keyword-public-key-searchable-encryption-with-strong-privacy-guarantee/
*Wang et al.: "Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee". INFOCOM 2015.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Mateus S. H. Cruz
Presentation given at the SWIM seminar (University of Tsukuba) about the paper "Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets"*.
This presentation is based on the uploader's understanding of the paper and may contain inaccurate interpretations.
A summary of the paper is available at: https://mshcruz.wordpress.com/2016/08/05/summary-fast-private-and-verifiable-server-aided-approximate-similarity-computation-over-large-scale-datasets/
*Qiu et al.: "Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets". SCC 2016.
ENKI: Access Control for Encrypted Query ProcessingMateus S. H. Cruz
Presentation given at the SWIM Seminar (University of Tsukuba) about ENKI*.
This presentation is based on the uploader's understanding of the paper and may contain inaccurate interpretations.
A summary of the paper is available at: https://mshcruz.wordpress.com/2016/07/11/summary-enki/
*Hang et al.: "ENKI: Access Control for Encrypted Query Processing". SIGMOD 2015.
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingMateus S. H. Cruz
Presentation about the paper "Fuzzy Keyword Search over Encrypted Data in Cloud Computing"*.
This presentation is based on the uploader's understanding of the paper and may contain inaccurate interpretations.
A summary of the paper is available at: https://mshcruz.wordpress.com/2016/08/16/summary-fuzzy-keyword-search-over-encrypted-data-in-cloud-computing/
*Li et al.: "Fuzzy Keyword Search over Encrypted Data in Cloud Computing". INFOCOM 2010.
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudMateus S. H. Cruz
Presentation given at the SWIM seminar (University of Tsukuba) about the paper "Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud"*.
This presentation is based on the uploader's understanding of the paper and may contain inaccurate interpretations.
A summary of the paper is available at: https://mshcruz.wordpress.com/2016/08/19/summary-privacy-preserving-multi-keyword-fuzzy-search-over-encrypted-data-in-the-cloud/
*Wang et al.: "Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud". INFOCOM 2014.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and random number to generate a new key to enhance the complexity of the generated key. Thereafter, multiplication operation was performed on the original text, thereby creating a random matrix (4×4) before the five stages of the coding cycles. A random substitution-box (S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the eXclusive OR (XOR) operation with digit 255, also with the key that was generated last. This research compared the features of the AES and OAES algorithms, particularly the extent of complexity, key size, and number of rounds. The OAES algorithm can enhance complexity of encryption and decryption by using random values, random S-Box, and chaotic maps, thereby resulting in difficulty guessing the original text.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...IJNSA Journal
The objective of the paper is to develop an proficient and economical method for Hard Disk Drive(HDD) Security. The task is implemented using Full Disk Encryption (FDE) with Advanced Encryption Standards(AES) for data security of Personal Computers(PCS) and Laptops . The focus of this work is to authenticate and protect the content of HDD from illegal use. The paper proposes a novel approach for protecting a HDD based on Partial Disk Encryption(PDE) which one of the flavour of FDE. The
proposed method is labelled as DiskTrust. FDE encrypts entire content or a single volume on your disk. Symmetric key uses same key for encryption as well for decryption. DiskTrust uses these two technology to build cost effective solution for small scale applications. Finally, the applicability of these methodologies for HDD security will be evaluated on a set of data files with different key sizes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 159
Encryption and Compression of Audio-Video Data Using Enhanced AES
and J-Bit Algorithm
Manpreet Kaur Grewal1
Ms. Sukhpreet Kaur2
1
M.Tech Research Scholar 2
Assistant Professor
1,2
Department of Computer Science & Engineering
1,2
Shri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, India
Abstract— AES is considered a good encryption algorithm
in terms of providing security to a network in passing
information (data) in form of audio, string, and video and in
any other form. However it yields a low throughput
resulting in slowness and increasing energy dispensation of
server or an application. The Enhanced AES algorithm is
proposed in this paper which works by using sequence
counters and provides improved throughput as compare to
conventional AES algorithm. The J-Bit Encoding is being a
compression algorithm in lossless category which doesn't
decrease the quality but reduce the size of data to some
extent. It has been observed that the proposed encryption
algorithm integrated to J-Bit Encoding algorithm will
provide the effective security measures as well as increased
throughput as a parameter and less bandwidth usage as the
actual size of data shall not be sent along the network.
Keywords: AES, J-Bit, MP3
I. INTRODUCTION
Cryptography can be defined as the art or science of
changing or altering information to a chaotic state, so that no
one can read the real information when it is transferred over
the network or any unsecured channel. Due to the rapid
growth of internet, there is need to protect the sensitive data
and advancements in technology are of great need to keep
data secure from malicious users. The main strength of the
cryptographic techniques is that no one can read the
information without altering its content which is not an easy
task. During the course of time, many encryption algorithms
have been proposed to achieve the goal of safe environment
for data transfer. The main objective for designing an
encryption algorithm must be security against all possible
unauthorized attacks. However, for all practical applications,
performance, processing time, power consumption and the
cost of implementation are also important factors to be
considered...The good security algorithm is the one that
strikes balance between these factors [3][16].
A. Audio-Video Encryption
Encryption is very important when confidential data is
transmitted over the network to keep the data secure.
Encryption is a technique used to transmit secure
information. During the course of time various encryption
techniques have been implemented. But many techniques
encrypt only text data, a very few technique are
implemented for multimedia data such as video and audio
data. The techniques proposed for text data can also be
applied to multimedia data but have not attained reasonable
results. Various encryption techniques are implemented for
multimedia data. Many of them are not sufficient to meet
real time requirements and some provide poor security
measures. Encryption process for of audio and video data is
complex than the methods used for text data. Multimedia
encryption ensures secure data transmission. With the fast
growth of communication technology, protection of
multimedia from the hackers became an important aspect for
the technologist. So there will always be a need of a more
secure and faster audio encryption technique [11] [16]
II. RELATED WORK
M. Anand Kumar, Dr.S.Karthikeyan [3] in 2012 has
proposed a method which evaluates the performance of two
commonly known symmetric key algorithms. These
algorithms are tested according to different performance
metrics. The simulation results showed that the performance
of Blowfish is better performance than AES in almost all the
test cases. It is concluded that blowfish is good for text
based encryption where as AES has better performance for
image encryption. It is also identified that there is change in
performance when there is a change in key size of AES
algorithm.
Milind Mathur, Ayush Kesarwani [5] in 2013 has
conducted a comparison for the performance -DES, 3DES,
RC2, RC6, BLOWFISH AND AES algorithms. Results
shows that here is no significant difference in the case of
either in hexadecimal base encoding or in base 64 encoding,
Blowfish has better performance than other common
encryption algorithms used. In the case of changing packet
size, RC2, RC6 and Blowfish has disadvantage over other
algorithms. In the case of changing data type such as image
instead of text.
Jawahar Thakur, Nagesh Kumar [6] in 2011
proposed a method for simulation based performance
analysis of most common symmetric key cryptography
algorithms: DES, AES, and Blowfish. This evaluated
performance of algorithms under different settings. Results
showed that Blowfish has a better performance than other
common encryption algorithms used.AES showed poor
performance results compared to other algorithms since it
requires more processing power. Using CBC mode has
added extra processing time, but overall it was relatively
negligible especially for certain application that requires
more secure encryption to a relatively large data blocks.
Bismita Gadanayak, Chittaranjan Pradhan, Utpal
Chandra Dey [8] in 2011have proposed a method presenting
different encryption techniques, which are applied on the
Moving Picture Expert Group Layer III (MP3) compression,
for securely transmitting audio data over the network.
Experiments concludes that the time consumption for
selective AES encryption on MP3 compression is less than
total AES and DES encryption techniques on MP3
compression.
Agus Dwi Suarjaya [9] in 2012 have proposed and
confirmed a data compression algorithm that can also be
used to optimize other algorithm. This algorithm is called j-
2. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 160
bit encoding (JBE).The algorithm will manipulates each bit
of data inside file to minimize the size without losing any
data after decoding which is classified to lossless
compression. The performance of this algorithm is measured
by comparing combination of different data compression
algorithms. An experiment was conducted by using 5 types
of files with 50 different sizes for each type, 5 combination
algorithms tested and compared. When inserted between
move to front transform (MTF) and arithmetic coding
(ARI), this algorithm gives better compression ratio.
Hyubgun Lee, Kyounghwa Lee, Yongtae Shin [10]
in 2009 proposed the solution of reliable sensor network
through measuring performance of AES encryption
algorithm by plaintext size to analyze the communication
efficiency and cost of operation per hop according to the
network scale. They analyzed the performance of AES
encryption algorithm on ATmega644p in 8-bit
microcontroller. As a result, scale of the sensor network
grows, the delay is doubled and energy consumption also
increased accordingly.
R.Gnanajeyaraman K.Prasadh, Dr.Ramar [11] in
2009 has proposed a novel higher dimensional chaotic
system for audio encryption in. Variables are treated as
encryption keys in order to achieve secure transmission of
audio signals. This gives much higher security. The higher
dimensional of the algorithm is used to enhance the key
space and security of the algorithm. The experiments show
that the algorithm has the characteristic of sensitive to initial
condition, high key space; digital audio signal distribution
uniformity and the algorithm will not break in
chosen/known-plaintext attack.
III. RESEARCH METHODOLOGY
Methodology of constructing the proposed system will
consists of various modules. Each module uses different
techniques and algorithms to perform its specific tasks.
After a particular module completes its task, its output will
become input for the next module. In the end the combined
effort of each module will be displayed. The working
modules of the proposed work are detailed below
A. Module 1-Symmetric Key Algorithm
The AES cryptographic algorithm falls under the symmetric
encryption, i.e. the same key is used at both ends to encrypt
and decrypt the data. However, AES actually depends on the
sequence counter instead of the encryption key. The major
benefit of using AES over other encryption algorithms is its
power of customization. The user can manipulate the
sequence counter according to his needs; whether he wants
it to be simple and faster or hard to crack and secure.
Sequence Counter - Sequence counter is used to provide the
dynamic behavior while converting the characters from one
form to another. Sequence counters are the imposed
temporary key to alter the characters and bits in the original
data. The sequence is applied to the chosen number of data
bits and the sequence number changes according to an
algorithm, which needs not to be saved or transferred over
the network.
The sequence counters in the proposed algorithm
are used at following levels:
1) Block level
This is the uppermost level where blocks characters of a
single block or line are transposed according to the sequence
counter.
2) Character Level
Every character have an equivalent ASCII value, which can
be merged with the sequence counter.
3) Binary Level
The binary level is lowermost level. The calculation done
here is totally is in form of 0 and 1. Bit level calculation
provide more security because its effect are visible to all the
level above it include character level.
The encryption process for the proposed work is
shown below.
Fig. 1: Enhanced AES encryption process
The decryption process for the proposed work is
shown below.
Fig. 2: Enhanced AES Decryption Process
The algorithm proposed in this paper works using
Sequence Counters is based on the concept of user
customization. The algorithm doesn‟t use the traditional
approach of using an encryption key; but defines a series of
sequence-counters for encoding. The cryptosystem gives
extra power to the user i.e. to choose the sequence counters.
Thus it is up to the user to maintain a balance
between speed and security provided by the algorithm. The
user can increase or decrease security and speed depending
3. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 161
upon his/ her needs. The cryptographic algorithm is based
partially on both stream and block encryption, hence the
output of same input block over same input sequence-
counter is dissimilar and provides enhanced security.
B. Module 2-J-bit encoding (JBE) Algorithm
J-bit encoding (JBE) works by manipulate bits of data to
reduce the size and optimize input for other algorithm. The
main idea of this algorithm is to split the input data into two
data where the first data will contain original nonzero byte
and the second data will contain bit value explaining
position of nonzero and zero bytes. Both data then can be
compress separately with other data compression algorithm
to achieve maximum compression ratio.
Step-by-step of the compression process can be describe as
below:
(1) Read input per byte, can be all types of file.
(2) Determine read byte as nonzero or zero byte.
(3) Write nonzero byte into data I and write bit „1‟ into
temporary byte data, or only write bit „0‟ into
temporary byte data for zero input byte.
(4) Repeat step 1-3 until temporary byte data filled
with 8 bits of data.
(5) If temporary byte data filled with 8 bit then write
the byte value of temporary byte data into data II.
(6) Clear temporary byte data.
(7) Repeat step 1-6 until end of file is reach.
(8) Write combined output data
(1) Write original input length.
(2) Write data I.
(3) Write data II.
Step-by-step of the decompression process can be describe
below:
(1) Read original input length.
(2) If was compressed separately, decompress data I
and data II (optional).
(3) Read data II per bit.
(4) Determine whether read bit is '0' or '1'.
(5) Write to output, if read bit is '1' then read and write
data I to output, if read bit is '0' then write zero byte
to output.
(6) Repeat step 2-5 until original input length is reach
[9]
IV. RESULTS
A. Analysis For Audio Data
1) Encryption Time for Audio Data
The table given below shows the encryption time consumed
by AES and the enhanced AES when audio files of different
size are encrypted.
Sr No.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
1 8884 980 955
2 8800 960 940
3 8282 825 800
4 7844 785 765
5 6867 690 675
6 6488 685 650
7 4677 575 556
8 2826 385 360
9 387 90 70
10 33 10 5
Table 1: Encryption Time for Audio Data
2) Bar graph of encryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in encrypting the audio files
of different size.
Fig. 3: Comparative status of encryption time amongAES
and enhanced AES (audio)
3) Average encryption time for audio data
The table below shows the average encryption time for
audio data.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 980 955
8800 960 940
8282 825 800
7844 785 765
6867 690 675
6488 685 650
4677 575 556
2826 385 360
387 90 70
33 10 5
Average time 5985 5776
Throughput 9.29 9.53
Table 2: Average Encryption Time For Audio Data
4) Bar graph of average encryption time
Fig. 4: Average encryption time for audio data
0
200
400
600
800
1000
1200
8884
8800
8282
7844
6867
6488
4677
2826
387
33
Durationtimeinmilliseconds
Audio file(KB)
AES
4. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 162
5) Decryption time for audio data
The table given below shows the decryption time consumed
by AES and the enhanced AES when audio files of different
size are decrypted.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 985 957
8800 967 944
8282 833 805
7844 790 769
6867 697 678
6488 690 655
4677 582 559
2826 390 365
387 100 77
33 15 9
Table 3: Decryption Time For Audio Data
6) Bar graph of decryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in decrypting the audio files
of different size.
Fig. 5: Comparative status of decryption time among
AES and enhanced AES (audio)
7) Average decryption time for audio data
The table below shows the average decryption time for
audio data.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 985 957
8800 967 944
8282 833 805
7844 790 769
6867 697 678
6488 690 655
4677 582 559
2826 390 365
387 100 77
33 15 9
Average Time 6049 5818
Throughput 9.10 9.46
Table 4: Average Decryption Time For Audio Data
8) Bar graph of average decryption time
The plot given below shows the bar graph of average
decryption time.
Fig. 6: Average decryption time for audio data
9) Throughput at encryption side (audio):
In the graph below, throughput for encryption side is drawn.
Fig. 7: Comparison of throughput at encryption side (audio)
From the above plot, it is observed that the
throughput at encryption end of enhanced AES is more than
that of AES algorithm.
10) Throughput at decryption side (audio)
In the graph below, throughput for encryption side is drawn.
Fig. 8: Comparison of throughput at decryption side (audio)
From the above plot, it is observed that the
throughput at decryption end of enhanced AES is more than
AES algorithm.
0
200
400
600
800
1000
1200
Durationtimeinmilliseconds
Audio file(KB)
AES
Enhanced AES
5700
5750
5800
5850
5900
5950
6000
6050
6100
AES Enhanced AES
Time(ms)
Cryptographic Algorithm
9
9.1
9.2
9.3
9.4
9.5
9.6
AES Enhanced AES
Throughput(KB/millisec)
Cryptographic algorithm
8.9
9
9.1
9.2
9.3
9.4
9.5
AES Enhanced AES
Throughput(KB/millisec)
Cryptographic algorithm
5. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 163
B. Analysis For Video Data
Encryption Time for Video Data: The table given below
shows the encryption time consumed by AES and the
enhanced AES when video files of different size are
encrypted.
Sr No.
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1 1013.76 57828 56700
2 892 42594 41300
3 701 36688 35250
4 372 14703 12980
5 157 6031 5050
6 103 4094 3090
7 89.2 3484 2754
8 54.1 2187 2000
9 16.9 782 601
10 2.74 125 112
Table 5: Encryption Time For Video Data
2) Bar graph of encryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in encrypting the video files
of different size.
Fig. 9: Comparative status of encryption time among AES
and enhanced AES (video)
3) Average encryption time for video data
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1013.76 57828 56700
892 42594 41300
701 36688 35250
372 14703 12980
157 6031 5050
103 4094 3090
89.2 3484 2754
54.1 2187 2000
16.9 782 601
2.74 125 112
Average Time 168471 159837
Throughput(MB/ms) 20.06 21.79
Table 6: Average Encryption Time For Video Data
4) Bar graph of average encryption time
Fig. 10: Average encryption time for video data
5) Decryption time for video data:
The table given below shows the decryption time consumed
by AES and the enhanced AES when video files of different
size are encrypted.
Sr No.
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1 1013.76 62140 61031
2 892 59859 57900
3 701 33984 32015
4 372 17172 16056
5 157 7297 7176
6 103 4859 4704
7 89.2 4156 4087
8 54.1 2532 2405
9 16.9 828 743
10 2.74 156 138
Table 7: Decryption Tine For Video Data
5) Bar graph of decryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in decrypting the video files
of different size.
Fig.11: Comparative status of decryption time among AES
and enhanced AES (video)
0
10000
20000
30000
40000
50000
60000
70000
Durationtimeinmilliseconds
Video file(MB)
AES
Enhanced AES
154000
156000
158000
160000
162000
164000
166000
168000
170000
AES Enhanced AES
Time(ms)
Cryptographic algorithm
0
10000
20000
30000
40000
50000
60000
70000
Durationtimeinmilliseconds
Video file(MB)
AES
Enhanced AES
6. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 164
From the above plot, it is observed that the throughput at
encryption end of enhanced AES is more than that of AES
algorithm.
7) Average decryption time for video data
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1013.76 62140 61031
892 59859 57900
701 33984 32015
372 17172 16056
157 7297 7176
103 4859 4704
89.2 4156 4087
54.1 2532 2405
16.9 828 743
2.74 156 138
Average Time 191983 186255
Throughput(MB/ms) 18.2 18.7
Table 7: Average Decryption Time For Video Data
8) Bar graph of average decryption time
The plot given below shows the bar graph of average
decryption time.
Fig. 12: Average decryption time for video data
9) Throughput at decryption side (video)
Fig. 13: Comparison of throughput at encryption side
(video)
10) Throughput at decryption side (video)
In the graph below, throughput for decryption side is drawn.
Fig. 14: Comparison of throughput at decryption side
(video)
From the above plot, it is observed that the
throughput at encryption end of enhanced AES is more than
that of AES algorithm.
V. CONCLUSION
The main goal of this thesis is to improve the throughput
and security of the AES algorithm with the design of the
enhanced AES algorithm and to compress the encrypted
data so as to transfer the data fast over the network. This
paper presented an enhanced AES algorithm along with a
lossless compression technique. Algorithm is implemented
for audio and video data. The encrypted data is further
compressed by J-Bit Encoding, a lossless compression
algorithm. Results shows that the algorithm requires less
encryption and decryption time to process audio and video
files as compare to conventional AES.The algorithm gives
improved throughput than conventional AES.
REFERENCES
[1] Rohan Rayarikar, Sanket Upadhyay, Priyanka
Pimpale, “SMS Encryption Using AES Algorithm on
Android”, International Journal of Advanced
Computer Applications, Vol.50, No.19, July 2012.
[2] G. Ramesh, Dr.R Umarani, “ A Survey on Various
Most Common Encryption Techniques ”,International
Journal of Advanced Research in Computer Science
and Software Engineering,Vol.2,No.2,March-April
2012.
[3] M. Anand Kumar, Dr.S.Karthikeyan, “Investing The
Efficiency of Blowfish and Rajindael (AES)
Algorithms”, International Journal of Engineering
Research and Applications, Vol.22, No.28, Feburary
2012.
[4] Ritu Pahal, Vikas Kumar, “Efficiencnt
Implementation of AES”, International Journal of
Advanced Research in Computer Science and
Software Engineering, Vol.3, No.7, July 2013.
[5] Milind Mathur, Ayush Kesarwani,“ Comparison
between DES , 3DES , RC2 , RC6 , Blowfish and
AES ”,Proceedings of National Conference on New
Horizons in IT - NCNHIT 2013.
[6] Jawahar Thakur, Nagesh Kumar, “AES, DES and
Blowfish: Symmetric Key Cryptography Algorithms
Simulation Based Performance Analysis”,
International Journal of Emerging Technology and
Advanced Engineering, Vol.1, Issue 2, Dec 2011.
183000
184000
185000
186000
187000
188000
189000
190000
191000
192000
193000
AES Enhanced AES
Time(ms)
Cryptographic algorithm
19.5
20
20.5
21
21.5
22
22.5
AES Enhanced AES
Throughput(MB/ms)
Cryptographic algorithm
17.9
18
18.1
18.2
18.3
18.4
18.5
18.6
18.7
18.8
AES Enhanced AES
Throughput(MB/ms)
Cryptographic algorithm
7. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 165
[7] B. Padmavathi, S. Ranjitha Kumari, “A Survey on
Performance Analysis of DES, AES And RSA
Algorithm along with LSB Substitution Technique”,
International Journal of Science and Research (IJSR),
India Online ISSN: 2319-7064.
[8] Bismita Gadanayak, Chittaranjan Pradhan, Utpal
Chandra Dey, “Comparative Study of Different
Encryption Techniques on MP3 Compression”,
International Journal of Computer Applications (0975
– 8887) Vol.26, No.3, July 2011.
[9] Agus Dwi Suarjaya, “A New Algorithm for Data
Compression Optimization”, International Journal of
Advanced Computer Science and Applications,
Vol.3, No.8, 2012.
[10]Hyubgun Lee, Kyounghwa Lee, Yongtae Shin, “AES
Implementation and Performance Evaluation on 8-bit
Microcontrollers”, International Journal of Computer
Science and Information Security, Vol. 6, No.1, 2009.
[11]R.Gnanajeyaraman, K. Prasadh, Dr. Ramar, “Audio
encryption using higher dimensional chaotic map ”,
International Journal of Recent Trends in
Engineering, Vol. 1, No. 2,May 2009
[12]Swati Paliwal, Ravindra Gupta, “A Review of Some
Popular Encryption Techniques”, International
Journal of Advanced Computer Science and
Applications, Vol.3, No.2, Feb 2013.
[13]S.Pavithra and Mrs. E. Ramadevi, “Performance
Evaluation of Symmetric Algorithms”, Vol.3, No.8,
Aug 2012.
[14]E. Thambiraja, G. Ramesh, DR. R. Umarani, “ A
Survey on Various Most Common encryption
Techniques”, International Journal of Advanced
Research in Computer Science and Software
Engineering, Vol.2,Issue7, July2012.
[15]Manpreet Kaur, Ms. Sukhpreet Kaur, “ Survey of
Various Encryption Techniques for Audio Data”,
International Journal of Advanced Research in
Computer Science and Software Engineering, Vol. 4,
Issue 5, May 2014.
[16]Diaa Salama Abd Elminaam, Hatem Mohamed
Abdual Kader and Mohiy Mohamed Hadhoud,
“Evaluating The Performance of Symmetric
Encryption Algorithms”, International Journal of
Network Security, Vol.10, No.3, May 2010.