SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 159
Encryption and Compression of Audio-Video Data Using Enhanced AES
and J-Bit Algorithm
Manpreet Kaur Grewal1
Ms. Sukhpreet Kaur2
1
M.Tech Research Scholar 2
Assistant Professor
1,2
Department of Computer Science & Engineering
1,2
Shri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, India
Abstract— AES is considered a good encryption algorithm
in terms of providing security to a network in passing
information (data) in form of audio, string, and video and in
any other form. However it yields a low throughput
resulting in slowness and increasing energy dispensation of
server or an application. The Enhanced AES algorithm is
proposed in this paper which works by using sequence
counters and provides improved throughput as compare to
conventional AES algorithm. The J-Bit Encoding is being a
compression algorithm in lossless category which doesn't
decrease the quality but reduce the size of data to some
extent. It has been observed that the proposed encryption
algorithm integrated to J-Bit Encoding algorithm will
provide the effective security measures as well as increased
throughput as a parameter and less bandwidth usage as the
actual size of data shall not be sent along the network.
Keywords: AES, J-Bit, MP3
I. INTRODUCTION
Cryptography can be defined as the art or science of
changing or altering information to a chaotic state, so that no
one can read the real information when it is transferred over
the network or any unsecured channel. Due to the rapid
growth of internet, there is need to protect the sensitive data
and advancements in technology are of great need to keep
data secure from malicious users. The main strength of the
cryptographic techniques is that no one can read the
information without altering its content which is not an easy
task. During the course of time, many encryption algorithms
have been proposed to achieve the goal of safe environment
for data transfer. The main objective for designing an
encryption algorithm must be security against all possible
unauthorized attacks. However, for all practical applications,
performance, processing time, power consumption and the
cost of implementation are also important factors to be
considered...The good security algorithm is the one that
strikes balance between these factors [3][16].
A. Audio-Video Encryption
Encryption is very important when confidential data is
transmitted over the network to keep the data secure.
Encryption is a technique used to transmit secure
information. During the course of time various encryption
techniques have been implemented. But many techniques
encrypt only text data, a very few technique are
implemented for multimedia data such as video and audio
data. The techniques proposed for text data can also be
applied to multimedia data but have not attained reasonable
results. Various encryption techniques are implemented for
multimedia data. Many of them are not sufficient to meet
real time requirements and some provide poor security
measures. Encryption process for of audio and video data is
complex than the methods used for text data. Multimedia
encryption ensures secure data transmission. With the fast
growth of communication technology, protection of
multimedia from the hackers became an important aspect for
the technologist. So there will always be a need of a more
secure and faster audio encryption technique [11] [16]
II. RELATED WORK
M. Anand Kumar, Dr.S.Karthikeyan [3] in 2012 has
proposed a method which evaluates the performance of two
commonly known symmetric key algorithms. These
algorithms are tested according to different performance
metrics. The simulation results showed that the performance
of Blowfish is better performance than AES in almost all the
test cases. It is concluded that blowfish is good for text
based encryption where as AES has better performance for
image encryption. It is also identified that there is change in
performance when there is a change in key size of AES
algorithm.
Milind Mathur, Ayush Kesarwani [5] in 2013 has
conducted a comparison for the performance -DES, 3DES,
RC2, RC6, BLOWFISH AND AES algorithms. Results
shows that here is no significant difference in the case of
either in hexadecimal base encoding or in base 64 encoding,
Blowfish has better performance than other common
encryption algorithms used. In the case of changing packet
size, RC2, RC6 and Blowfish has disadvantage over other
algorithms. In the case of changing data type such as image
instead of text.
Jawahar Thakur, Nagesh Kumar [6] in 2011
proposed a method for simulation based performance
analysis of most common symmetric key cryptography
algorithms: DES, AES, and Blowfish. This evaluated
performance of algorithms under different settings. Results
showed that Blowfish has a better performance than other
common encryption algorithms used.AES showed poor
performance results compared to other algorithms since it
requires more processing power. Using CBC mode has
added extra processing time, but overall it was relatively
negligible especially for certain application that requires
more secure encryption to a relatively large data blocks.
Bismita Gadanayak, Chittaranjan Pradhan, Utpal
Chandra Dey [8] in 2011have proposed a method presenting
different encryption techniques, which are applied on the
Moving Picture Expert Group Layer III (MP3) compression,
for securely transmitting audio data over the network.
Experiments concludes that the time consumption for
selective AES encryption on MP3 compression is less than
total AES and DES encryption techniques on MP3
compression.
Agus Dwi Suarjaya [9] in 2012 have proposed and
confirmed a data compression algorithm that can also be
used to optimize other algorithm. This algorithm is called j-
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 160
bit encoding (JBE).The algorithm will manipulates each bit
of data inside file to minimize the size without losing any
data after decoding which is classified to lossless
compression. The performance of this algorithm is measured
by comparing combination of different data compression
algorithms. An experiment was conducted by using 5 types
of files with 50 different sizes for each type, 5 combination
algorithms tested and compared. When inserted between
move to front transform (MTF) and arithmetic coding
(ARI), this algorithm gives better compression ratio.
Hyubgun Lee, Kyounghwa Lee, Yongtae Shin [10]
in 2009 proposed the solution of reliable sensor network
through measuring performance of AES encryption
algorithm by plaintext size to analyze the communication
efficiency and cost of operation per hop according to the
network scale. They analyzed the performance of AES
encryption algorithm on ATmega644p in 8-bit
microcontroller. As a result, scale of the sensor network
grows, the delay is doubled and energy consumption also
increased accordingly.
R.Gnanajeyaraman K.Prasadh, Dr.Ramar [11] in
2009 has proposed a novel higher dimensional chaotic
system for audio encryption in. Variables are treated as
encryption keys in order to achieve secure transmission of
audio signals. This gives much higher security. The higher
dimensional of the algorithm is used to enhance the key
space and security of the algorithm. The experiments show
that the algorithm has the characteristic of sensitive to initial
condition, high key space; digital audio signal distribution
uniformity and the algorithm will not break in
chosen/known-plaintext attack.
III. RESEARCH METHODOLOGY
Methodology of constructing the proposed system will
consists of various modules. Each module uses different
techniques and algorithms to perform its specific tasks.
After a particular module completes its task, its output will
become input for the next module. In the end the combined
effort of each module will be displayed. The working
modules of the proposed work are detailed below
A. Module 1-Symmetric Key Algorithm
The AES cryptographic algorithm falls under the symmetric
encryption, i.e. the same key is used at both ends to encrypt
and decrypt the data. However, AES actually depends on the
sequence counter instead of the encryption key. The major
benefit of using AES over other encryption algorithms is its
power of customization. The user can manipulate the
sequence counter according to his needs; whether he wants
it to be simple and faster or hard to crack and secure.
Sequence Counter - Sequence counter is used to provide the
dynamic behavior while converting the characters from one
form to another. Sequence counters are the imposed
temporary key to alter the characters and bits in the original
data. The sequence is applied to the chosen number of data
bits and the sequence number changes according to an
algorithm, which needs not to be saved or transferred over
the network.
The sequence counters in the proposed algorithm
are used at following levels:
1) Block level
This is the uppermost level where blocks characters of a
single block or line are transposed according to the sequence
counter.
2) Character Level
Every character have an equivalent ASCII value, which can
be merged with the sequence counter.
3) Binary Level
The binary level is lowermost level. The calculation done
here is totally is in form of 0 and 1. Bit level calculation
provide more security because its effect are visible to all the
level above it include character level.
The encryption process for the proposed work is
shown below.
Fig. 1: Enhanced AES encryption process
The decryption process for the proposed work is
shown below.
Fig. 2: Enhanced AES Decryption Process
The algorithm proposed in this paper works using
Sequence Counters is based on the concept of user
customization. The algorithm doesn‟t use the traditional
approach of using an encryption key; but defines a series of
sequence-counters for encoding. The cryptosystem gives
extra power to the user i.e. to choose the sequence counters.
Thus it is up to the user to maintain a balance
between speed and security provided by the algorithm. The
user can increase or decrease security and speed depending
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 161
upon his/ her needs. The cryptographic algorithm is based
partially on both stream and block encryption, hence the
output of same input block over same input sequence-
counter is dissimilar and provides enhanced security.
B. Module 2-J-bit encoding (JBE) Algorithm
J-bit encoding (JBE) works by manipulate bits of data to
reduce the size and optimize input for other algorithm. The
main idea of this algorithm is to split the input data into two
data where the first data will contain original nonzero byte
and the second data will contain bit value explaining
position of nonzero and zero bytes. Both data then can be
compress separately with other data compression algorithm
to achieve maximum compression ratio.
Step-by-step of the compression process can be describe as
below:
(1) Read input per byte, can be all types of file.
(2) Determine read byte as nonzero or zero byte.
(3) Write nonzero byte into data I and write bit „1‟ into
temporary byte data, or only write bit „0‟ into
temporary byte data for zero input byte.
(4) Repeat step 1-3 until temporary byte data filled
with 8 bits of data.
(5) If temporary byte data filled with 8 bit then write
the byte value of temporary byte data into data II.
(6) Clear temporary byte data.
(7) Repeat step 1-6 until end of file is reach.
(8) Write combined output data
(1) Write original input length.
(2) Write data I.
(3) Write data II.
Step-by-step of the decompression process can be describe
below:
(1) Read original input length.
(2) If was compressed separately, decompress data I
and data II (optional).
(3) Read data II per bit.
(4) Determine whether read bit is '0' or '1'.
(5) Write to output, if read bit is '1' then read and write
data I to output, if read bit is '0' then write zero byte
to output.
(6) Repeat step 2-5 until original input length is reach
[9]
IV. RESULTS
A. Analysis For Audio Data
1) Encryption Time for Audio Data
The table given below shows the encryption time consumed
by AES and the enhanced AES when audio files of different
size are encrypted.
Sr No.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
1 8884 980 955
2 8800 960 940
3 8282 825 800
4 7844 785 765
5 6867 690 675
6 6488 685 650
7 4677 575 556
8 2826 385 360
9 387 90 70
10 33 10 5
Table 1: Encryption Time for Audio Data
2) Bar graph of encryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in encrypting the audio files
of different size.
Fig. 3: Comparative status of encryption time amongAES
and enhanced AES (audio)
3) Average encryption time for audio data
The table below shows the average encryption time for
audio data.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 980 955
8800 960 940
8282 825 800
7844 785 765
6867 690 675
6488 685 650
4677 575 556
2826 385 360
387 90 70
33 10 5
Average time 5985 5776
Throughput 9.29 9.53
Table 2: Average Encryption Time For Audio Data
4) Bar graph of average encryption time
Fig. 4: Average encryption time for audio data
0
200
400
600
800
1000
1200
8884
8800
8282
7844
6867
6488
4677
2826
387
33
Durationtimeinmilliseconds
Audio file(KB)
AES
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 162
5) Decryption time for audio data
The table given below shows the decryption time consumed
by AES and the enhanced AES when audio files of different
size are decrypted.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 985 957
8800 967 944
8282 833 805
7844 790 769
6867 697 678
6488 690 655
4677 582 559
2826 390 365
387 100 77
33 15 9
Table 3: Decryption Time For Audio Data
6) Bar graph of decryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in decrypting the audio files
of different size.
Fig. 5: Comparative status of decryption time among
AES and enhanced AES (audio)
7) Average decryption time for audio data
The table below shows the average decryption time for
audio data.
Audio File
(KB)
AES
(ms)
Enhanced AES
(ms)
8884 985 957
8800 967 944
8282 833 805
7844 790 769
6867 697 678
6488 690 655
4677 582 559
2826 390 365
387 100 77
33 15 9
Average Time 6049 5818
Throughput 9.10 9.46
Table 4: Average Decryption Time For Audio Data
8) Bar graph of average decryption time
The plot given below shows the bar graph of average
decryption time.
Fig. 6: Average decryption time for audio data
9) Throughput at encryption side (audio):
In the graph below, throughput for encryption side is drawn.
Fig. 7: Comparison of throughput at encryption side (audio)
From the above plot, it is observed that the
throughput at encryption end of enhanced AES is more than
that of AES algorithm.
10) Throughput at decryption side (audio)
In the graph below, throughput for encryption side is drawn.
Fig. 8: Comparison of throughput at decryption side (audio)
From the above plot, it is observed that the
throughput at decryption end of enhanced AES is more than
AES algorithm.
0
200
400
600
800
1000
1200
Durationtimeinmilliseconds
Audio file(KB)
AES
Enhanced AES
5700
5750
5800
5850
5900
5950
6000
6050
6100
AES Enhanced AES
Time(ms)
Cryptographic Algorithm
9
9.1
9.2
9.3
9.4
9.5
9.6
AES Enhanced AES
Throughput(KB/millisec)
Cryptographic algorithm
8.9
9
9.1
9.2
9.3
9.4
9.5
AES Enhanced AES
Throughput(KB/millisec)
Cryptographic algorithm
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 163
B. Analysis For Video Data
Encryption Time for Video Data: The table given below
shows the encryption time consumed by AES and the
enhanced AES when video files of different size are
encrypted.
Sr No.
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1 1013.76 57828 56700
2 892 42594 41300
3 701 36688 35250
4 372 14703 12980
5 157 6031 5050
6 103 4094 3090
7 89.2 3484 2754
8 54.1 2187 2000
9 16.9 782 601
10 2.74 125 112
Table 5: Encryption Time For Video Data
2) Bar graph of encryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in encrypting the video files
of different size.
Fig. 9: Comparative status of encryption time among AES
and enhanced AES (video)
3) Average encryption time for video data
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1013.76 57828 56700
892 42594 41300
701 36688 35250
372 14703 12980
157 6031 5050
103 4094 3090
89.2 3484 2754
54.1 2187 2000
16.9 782 601
2.74 125 112
Average Time 168471 159837
Throughput(MB/ms) 20.06 21.79
Table 6: Average Encryption Time For Video Data
4) Bar graph of average encryption time
Fig. 10: Average encryption time for video data
5) Decryption time for video data:
The table given below shows the decryption time consumed
by AES and the enhanced AES when video files of different
size are encrypted.
Sr No.
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1 1013.76 62140 61031
2 892 59859 57900
3 701 33984 32015
4 372 17172 16056
5 157 7297 7176
6 103 4859 4704
7 89.2 4156 4087
8 54.1 2532 2405
9 16.9 828 743
10 2.74 156 138
Table 7: Decryption Tine For Video Data
5) Bar graph of decryption time
The graph below shows how much time the AES algorithm
and the enhanced AES will take in decrypting the video files
of different size.
Fig.11: Comparative status of decryption time among AES
and enhanced AES (video)
0
10000
20000
30000
40000
50000
60000
70000
Durationtimeinmilliseconds
Video file(MB)
AES
Enhanced AES
154000
156000
158000
160000
162000
164000
166000
168000
170000
AES Enhanced AES
Time(ms)
Cryptographic algorithm
0
10000
20000
30000
40000
50000
60000
70000
Durationtimeinmilliseconds
Video file(MB)
AES
Enhanced AES
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 164
From the above plot, it is observed that the throughput at
encryption end of enhanced AES is more than that of AES
algorithm.
7) Average decryption time for video data
Video Files
(MB)
AES
(ms)
Enhanced AES
(ms)
1013.76 62140 61031
892 59859 57900
701 33984 32015
372 17172 16056
157 7297 7176
103 4859 4704
89.2 4156 4087
54.1 2532 2405
16.9 828 743
2.74 156 138
Average Time 191983 186255
Throughput(MB/ms) 18.2 18.7
Table 7: Average Decryption Time For Video Data
8) Bar graph of average decryption time
The plot given below shows the bar graph of average
decryption time.
Fig. 12: Average decryption time for video data
9) Throughput at decryption side (video)
Fig. 13: Comparison of throughput at encryption side
(video)
10) Throughput at decryption side (video)
In the graph below, throughput for decryption side is drawn.
Fig. 14: Comparison of throughput at decryption side
(video)
From the above plot, it is observed that the
throughput at encryption end of enhanced AES is more than
that of AES algorithm.
V. CONCLUSION
The main goal of this thesis is to improve the throughput
and security of the AES algorithm with the design of the
enhanced AES algorithm and to compress the encrypted
data so as to transfer the data fast over the network. This
paper presented an enhanced AES algorithm along with a
lossless compression technique. Algorithm is implemented
for audio and video data. The encrypted data is further
compressed by J-Bit Encoding, a lossless compression
algorithm. Results shows that the algorithm requires less
encryption and decryption time to process audio and video
files as compare to conventional AES.The algorithm gives
improved throughput than conventional AES.
REFERENCES
[1] Rohan Rayarikar, Sanket Upadhyay, Priyanka
Pimpale, “SMS Encryption Using AES Algorithm on
Android”, International Journal of Advanced
Computer Applications, Vol.50, No.19, July 2012.
[2] G. Ramesh, Dr.R Umarani, “ A Survey on Various
Most Common Encryption Techniques ”,International
Journal of Advanced Research in Computer Science
and Software Engineering,Vol.2,No.2,March-April
2012.
[3] M. Anand Kumar, Dr.S.Karthikeyan, “Investing The
Efficiency of Blowfish and Rajindael (AES)
Algorithms”, International Journal of Engineering
Research and Applications, Vol.22, No.28, Feburary
2012.
[4] Ritu Pahal, Vikas Kumar, “Efficiencnt
Implementation of AES”, International Journal of
Advanced Research in Computer Science and
Software Engineering, Vol.3, No.7, July 2013.
[5] Milind Mathur, Ayush Kesarwani,“ Comparison
between DES , 3DES , RC2 , RC6 , Blowfish and
AES ”,Proceedings of National Conference on New
Horizons in IT - NCNHIT 2013.
[6] Jawahar Thakur, Nagesh Kumar, “AES, DES and
Blowfish: Symmetric Key Cryptography Algorithms
Simulation Based Performance Analysis”,
International Journal of Emerging Technology and
Advanced Engineering, Vol.1, Issue 2, Dec 2011.
183000
184000
185000
186000
187000
188000
189000
190000
191000
192000
193000
AES Enhanced AES
Time(ms)
Cryptographic algorithm
19.5
20
20.5
21
21.5
22
22.5
AES Enhanced AES
Throughput(MB/ms)
Cryptographic algorithm
17.9
18
18.1
18.2
18.3
18.4
18.5
18.6
18.7
18.8
AES Enhanced AES
Throughput(MB/ms)
Cryptographic algorithm
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm
(IJSRD/Vol. 2/Issue 08/2014/039)
All rights reserved by www.ijsrd.com 165
[7] B. Padmavathi, S. Ranjitha Kumari, “A Survey on
Performance Analysis of DES, AES And RSA
Algorithm along with LSB Substitution Technique”,
International Journal of Science and Research (IJSR),
India Online ISSN: 2319-7064.
[8] Bismita Gadanayak, Chittaranjan Pradhan, Utpal
Chandra Dey, “Comparative Study of Different
Encryption Techniques on MP3 Compression”,
International Journal of Computer Applications (0975
– 8887) Vol.26, No.3, July 2011.
[9] Agus Dwi Suarjaya, “A New Algorithm for Data
Compression Optimization”, International Journal of
Advanced Computer Science and Applications,
Vol.3, No.8, 2012.
[10]Hyubgun Lee, Kyounghwa Lee, Yongtae Shin, “AES
Implementation and Performance Evaluation on 8-bit
Microcontrollers”, International Journal of Computer
Science and Information Security, Vol. 6, No.1, 2009.
[11]R.Gnanajeyaraman, K. Prasadh, Dr. Ramar, “Audio
encryption using higher dimensional chaotic map ”,
International Journal of Recent Trends in
Engineering, Vol. 1, No. 2,May 2009
[12]Swati Paliwal, Ravindra Gupta, “A Review of Some
Popular Encryption Techniques”, International
Journal of Advanced Computer Science and
Applications, Vol.3, No.2, Feb 2013.
[13]S.Pavithra and Mrs. E. Ramadevi, “Performance
Evaluation of Symmetric Algorithms”, Vol.3, No.8,
Aug 2012.
[14]E. Thambiraja, G. Ramesh, DR. R. Umarani, “ A
Survey on Various Most Common encryption
Techniques”, International Journal of Advanced
Research in Computer Science and Software
Engineering, Vol.2,Issue7, July2012.
[15]Manpreet Kaur, Ms. Sukhpreet Kaur, “ Survey of
Various Encryption Techniques for Audio Data”,
International Journal of Advanced Research in
Computer Science and Software Engineering, Vol. 4,
Issue 5, May 2014.
[16]Diaa Salama Abd Elminaam, Hatem Mohamed
Abdual Kader and Mohiy Mohamed Hadhoud,
“Evaluating The Performance of Symmetric
Encryption Algorithms”, International Journal of
Network Security, Vol.10, No.3, May 2010.

More Related Content

What's hot

Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
IJECEIAES
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...
TELKOMNIKA JOURNAL
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Bespoke Technique for Secret Messaging
Bespoke Technique for Secret MessagingBespoke Technique for Secret Messaging
Bespoke Technique for Secret Messaging
Ajay Kumar
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
IJECEIAES
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
Mauryasuraj98
 

What's hot (20)

Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Bespoke Technique for Secret Messaging
Bespoke Technique for Secret MessagingBespoke Technique for Secret Messaging
Bespoke Technique for Secret Messaging
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
 

Viewers also liked

Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
Jun Steed Huang
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
iosrjce
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Mateus S. H. Cruz
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Mateus S. H. Cruz
 
ENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query ProcessingENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query Processing
Mateus S. H. Cruz
 
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Mateus S. H. Cruz
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Mateus S. H. Cruz
 

Viewers also liked (10)

Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
 
ENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query ProcessingENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query Processing
 
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
 

Similar to Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm

IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
IJNSA Journal
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES Algorithm
IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
G044082934
G044082934G044082934
G044082934
IJERA Editor
 
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
IJNSA Journal
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
IJERA Editor
 

Similar to Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (20)

IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES Algorithm
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
G044082934
G044082934G044082934
G044082934
 
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 159 Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm Manpreet Kaur Grewal1 Ms. Sukhpreet Kaur2 1 M.Tech Research Scholar 2 Assistant Professor 1,2 Department of Computer Science & Engineering 1,2 Shri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, India Abstract— AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network. Keywords: AES, J-Bit, MP3 I. INTRODUCTION Cryptography can be defined as the art or science of changing or altering information to a chaotic state, so that no one can read the real information when it is transferred over the network or any unsecured channel. Due to the rapid growth of internet, there is need to protect the sensitive data and advancements in technology are of great need to keep data secure from malicious users. The main strength of the cryptographic techniques is that no one can read the information without altering its content which is not an easy task. During the course of time, many encryption algorithms have been proposed to achieve the goal of safe environment for data transfer. The main objective for designing an encryption algorithm must be security against all possible unauthorized attacks. However, for all practical applications, performance, processing time, power consumption and the cost of implementation are also important factors to be considered...The good security algorithm is the one that strikes balance between these factors [3][16]. A. Audio-Video Encryption Encryption is very important when confidential data is transmitted over the network to keep the data secure. Encryption is a technique used to transmit secure information. During the course of time various encryption techniques have been implemented. But many techniques encrypt only text data, a very few technique are implemented for multimedia data such as video and audio data. The techniques proposed for text data can also be applied to multimedia data but have not attained reasonable results. Various encryption techniques are implemented for multimedia data. Many of them are not sufficient to meet real time requirements and some provide poor security measures. Encryption process for of audio and video data is complex than the methods used for text data. Multimedia encryption ensures secure data transmission. With the fast growth of communication technology, protection of multimedia from the hackers became an important aspect for the technologist. So there will always be a need of a more secure and faster audio encryption technique [11] [16] II. RELATED WORK M. Anand Kumar, Dr.S.Karthikeyan [3] in 2012 has proposed a method which evaluates the performance of two commonly known symmetric key algorithms. These algorithms are tested according to different performance metrics. The simulation results showed that the performance of Blowfish is better performance than AES in almost all the test cases. It is concluded that blowfish is good for text based encryption where as AES has better performance for image encryption. It is also identified that there is change in performance when there is a change in key size of AES algorithm. Milind Mathur, Ayush Kesarwani [5] in 2013 has conducted a comparison for the performance -DES, 3DES, RC2, RC6, BLOWFISH AND AES algorithms. Results shows that here is no significant difference in the case of either in hexadecimal base encoding or in base 64 encoding, Blowfish has better performance than other common encryption algorithms used. In the case of changing packet size, RC2, RC6 and Blowfish has disadvantage over other algorithms. In the case of changing data type such as image instead of text. Jawahar Thakur, Nagesh Kumar [6] in 2011 proposed a method for simulation based performance analysis of most common symmetric key cryptography algorithms: DES, AES, and Blowfish. This evaluated performance of algorithms under different settings. Results showed that Blowfish has a better performance than other common encryption algorithms used.AES showed poor performance results compared to other algorithms since it requires more processing power. Using CBC mode has added extra processing time, but overall it was relatively negligible especially for certain application that requires more secure encryption to a relatively large data blocks. Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey [8] in 2011have proposed a method presenting different encryption techniques, which are applied on the Moving Picture Expert Group Layer III (MP3) compression, for securely transmitting audio data over the network. Experiments concludes that the time consumption for selective AES encryption on MP3 compression is less than total AES and DES encryption techniques on MP3 compression. Agus Dwi Suarjaya [9] in 2012 have proposed and confirmed a data compression algorithm that can also be used to optimize other algorithm. This algorithm is called j-
  • 2. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 160 bit encoding (JBE).The algorithm will manipulates each bit of data inside file to minimize the size without losing any data after decoding which is classified to lossless compression. The performance of this algorithm is measured by comparing combination of different data compression algorithms. An experiment was conducted by using 5 types of files with 50 different sizes for each type, 5 combination algorithms tested and compared. When inserted between move to front transform (MTF) and arithmetic coding (ARI), this algorithm gives better compression ratio. Hyubgun Lee, Kyounghwa Lee, Yongtae Shin [10] in 2009 proposed the solution of reliable sensor network through measuring performance of AES encryption algorithm by plaintext size to analyze the communication efficiency and cost of operation per hop according to the network scale. They analyzed the performance of AES encryption algorithm on ATmega644p in 8-bit microcontroller. As a result, scale of the sensor network grows, the delay is doubled and energy consumption also increased accordingly. R.Gnanajeyaraman K.Prasadh, Dr.Ramar [11] in 2009 has proposed a novel higher dimensional chaotic system for audio encryption in. Variables are treated as encryption keys in order to achieve secure transmission of audio signals. This gives much higher security. The higher dimensional of the algorithm is used to enhance the key space and security of the algorithm. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space; digital audio signal distribution uniformity and the algorithm will not break in chosen/known-plaintext attack. III. RESEARCH METHODOLOGY Methodology of constructing the proposed system will consists of various modules. Each module uses different techniques and algorithms to perform its specific tasks. After a particular module completes its task, its output will become input for the next module. In the end the combined effort of each module will be displayed. The working modules of the proposed work are detailed below A. Module 1-Symmetric Key Algorithm The AES cryptographic algorithm falls under the symmetric encryption, i.e. the same key is used at both ends to encrypt and decrypt the data. However, AES actually depends on the sequence counter instead of the encryption key. The major benefit of using AES over other encryption algorithms is its power of customization. The user can manipulate the sequence counter according to his needs; whether he wants it to be simple and faster or hard to crack and secure. Sequence Counter - Sequence counter is used to provide the dynamic behavior while converting the characters from one form to another. Sequence counters are the imposed temporary key to alter the characters and bits in the original data. The sequence is applied to the chosen number of data bits and the sequence number changes according to an algorithm, which needs not to be saved or transferred over the network. The sequence counters in the proposed algorithm are used at following levels: 1) Block level This is the uppermost level where blocks characters of a single block or line are transposed according to the sequence counter. 2) Character Level Every character have an equivalent ASCII value, which can be merged with the sequence counter. 3) Binary Level The binary level is lowermost level. The calculation done here is totally is in form of 0 and 1. Bit level calculation provide more security because its effect are visible to all the level above it include character level. The encryption process for the proposed work is shown below. Fig. 1: Enhanced AES encryption process The decryption process for the proposed work is shown below. Fig. 2: Enhanced AES Decryption Process The algorithm proposed in this paper works using Sequence Counters is based on the concept of user customization. The algorithm doesn‟t use the traditional approach of using an encryption key; but defines a series of sequence-counters for encoding. The cryptosystem gives extra power to the user i.e. to choose the sequence counters. Thus it is up to the user to maintain a balance between speed and security provided by the algorithm. The user can increase or decrease security and speed depending
  • 3. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 161 upon his/ her needs. The cryptographic algorithm is based partially on both stream and block encryption, hence the output of same input block over same input sequence- counter is dissimilar and provides enhanced security. B. Module 2-J-bit encoding (JBE) Algorithm J-bit encoding (JBE) works by manipulate bits of data to reduce the size and optimize input for other algorithm. The main idea of this algorithm is to split the input data into two data where the first data will contain original nonzero byte and the second data will contain bit value explaining position of nonzero and zero bytes. Both data then can be compress separately with other data compression algorithm to achieve maximum compression ratio. Step-by-step of the compression process can be describe as below: (1) Read input per byte, can be all types of file. (2) Determine read byte as nonzero or zero byte. (3) Write nonzero byte into data I and write bit „1‟ into temporary byte data, or only write bit „0‟ into temporary byte data for zero input byte. (4) Repeat step 1-3 until temporary byte data filled with 8 bits of data. (5) If temporary byte data filled with 8 bit then write the byte value of temporary byte data into data II. (6) Clear temporary byte data. (7) Repeat step 1-6 until end of file is reach. (8) Write combined output data (1) Write original input length. (2) Write data I. (3) Write data II. Step-by-step of the decompression process can be describe below: (1) Read original input length. (2) If was compressed separately, decompress data I and data II (optional). (3) Read data II per bit. (4) Determine whether read bit is '0' or '1'. (5) Write to output, if read bit is '1' then read and write data I to output, if read bit is '0' then write zero byte to output. (6) Repeat step 2-5 until original input length is reach [9] IV. RESULTS A. Analysis For Audio Data 1) Encryption Time for Audio Data The table given below shows the encryption time consumed by AES and the enhanced AES when audio files of different size are encrypted. Sr No. Audio File (KB) AES (ms) Enhanced AES (ms) 1 8884 980 955 2 8800 960 940 3 8282 825 800 4 7844 785 765 5 6867 690 675 6 6488 685 650 7 4677 575 556 8 2826 385 360 9 387 90 70 10 33 10 5 Table 1: Encryption Time for Audio Data 2) Bar graph of encryption time The graph below shows how much time the AES algorithm and the enhanced AES will take in encrypting the audio files of different size. Fig. 3: Comparative status of encryption time amongAES and enhanced AES (audio) 3) Average encryption time for audio data The table below shows the average encryption time for audio data. Audio File (KB) AES (ms) Enhanced AES (ms) 8884 980 955 8800 960 940 8282 825 800 7844 785 765 6867 690 675 6488 685 650 4677 575 556 2826 385 360 387 90 70 33 10 5 Average time 5985 5776 Throughput 9.29 9.53 Table 2: Average Encryption Time For Audio Data 4) Bar graph of average encryption time Fig. 4: Average encryption time for audio data 0 200 400 600 800 1000 1200 8884 8800 8282 7844 6867 6488 4677 2826 387 33 Durationtimeinmilliseconds Audio file(KB) AES
  • 4. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 162 5) Decryption time for audio data The table given below shows the decryption time consumed by AES and the enhanced AES when audio files of different size are decrypted. Audio File (KB) AES (ms) Enhanced AES (ms) 8884 985 957 8800 967 944 8282 833 805 7844 790 769 6867 697 678 6488 690 655 4677 582 559 2826 390 365 387 100 77 33 15 9 Table 3: Decryption Time For Audio Data 6) Bar graph of decryption time The graph below shows how much time the AES algorithm and the enhanced AES will take in decrypting the audio files of different size. Fig. 5: Comparative status of decryption time among AES and enhanced AES (audio) 7) Average decryption time for audio data The table below shows the average decryption time for audio data. Audio File (KB) AES (ms) Enhanced AES (ms) 8884 985 957 8800 967 944 8282 833 805 7844 790 769 6867 697 678 6488 690 655 4677 582 559 2826 390 365 387 100 77 33 15 9 Average Time 6049 5818 Throughput 9.10 9.46 Table 4: Average Decryption Time For Audio Data 8) Bar graph of average decryption time The plot given below shows the bar graph of average decryption time. Fig. 6: Average decryption time for audio data 9) Throughput at encryption side (audio): In the graph below, throughput for encryption side is drawn. Fig. 7: Comparison of throughput at encryption side (audio) From the above plot, it is observed that the throughput at encryption end of enhanced AES is more than that of AES algorithm. 10) Throughput at decryption side (audio) In the graph below, throughput for encryption side is drawn. Fig. 8: Comparison of throughput at decryption side (audio) From the above plot, it is observed that the throughput at decryption end of enhanced AES is more than AES algorithm. 0 200 400 600 800 1000 1200 Durationtimeinmilliseconds Audio file(KB) AES Enhanced AES 5700 5750 5800 5850 5900 5950 6000 6050 6100 AES Enhanced AES Time(ms) Cryptographic Algorithm 9 9.1 9.2 9.3 9.4 9.5 9.6 AES Enhanced AES Throughput(KB/millisec) Cryptographic algorithm 8.9 9 9.1 9.2 9.3 9.4 9.5 AES Enhanced AES Throughput(KB/millisec) Cryptographic algorithm
  • 5. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 163 B. Analysis For Video Data Encryption Time for Video Data: The table given below shows the encryption time consumed by AES and the enhanced AES when video files of different size are encrypted. Sr No. Video Files (MB) AES (ms) Enhanced AES (ms) 1 1013.76 57828 56700 2 892 42594 41300 3 701 36688 35250 4 372 14703 12980 5 157 6031 5050 6 103 4094 3090 7 89.2 3484 2754 8 54.1 2187 2000 9 16.9 782 601 10 2.74 125 112 Table 5: Encryption Time For Video Data 2) Bar graph of encryption time The graph below shows how much time the AES algorithm and the enhanced AES will take in encrypting the video files of different size. Fig. 9: Comparative status of encryption time among AES and enhanced AES (video) 3) Average encryption time for video data Video Files (MB) AES (ms) Enhanced AES (ms) 1013.76 57828 56700 892 42594 41300 701 36688 35250 372 14703 12980 157 6031 5050 103 4094 3090 89.2 3484 2754 54.1 2187 2000 16.9 782 601 2.74 125 112 Average Time 168471 159837 Throughput(MB/ms) 20.06 21.79 Table 6: Average Encryption Time For Video Data 4) Bar graph of average encryption time Fig. 10: Average encryption time for video data 5) Decryption time for video data: The table given below shows the decryption time consumed by AES and the enhanced AES when video files of different size are encrypted. Sr No. Video Files (MB) AES (ms) Enhanced AES (ms) 1 1013.76 62140 61031 2 892 59859 57900 3 701 33984 32015 4 372 17172 16056 5 157 7297 7176 6 103 4859 4704 7 89.2 4156 4087 8 54.1 2532 2405 9 16.9 828 743 10 2.74 156 138 Table 7: Decryption Tine For Video Data 5) Bar graph of decryption time The graph below shows how much time the AES algorithm and the enhanced AES will take in decrypting the video files of different size. Fig.11: Comparative status of decryption time among AES and enhanced AES (video) 0 10000 20000 30000 40000 50000 60000 70000 Durationtimeinmilliseconds Video file(MB) AES Enhanced AES 154000 156000 158000 160000 162000 164000 166000 168000 170000 AES Enhanced AES Time(ms) Cryptographic algorithm 0 10000 20000 30000 40000 50000 60000 70000 Durationtimeinmilliseconds Video file(MB) AES Enhanced AES
  • 6. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 164 From the above plot, it is observed that the throughput at encryption end of enhanced AES is more than that of AES algorithm. 7) Average decryption time for video data Video Files (MB) AES (ms) Enhanced AES (ms) 1013.76 62140 61031 892 59859 57900 701 33984 32015 372 17172 16056 157 7297 7176 103 4859 4704 89.2 4156 4087 54.1 2532 2405 16.9 828 743 2.74 156 138 Average Time 191983 186255 Throughput(MB/ms) 18.2 18.7 Table 7: Average Decryption Time For Video Data 8) Bar graph of average decryption time The plot given below shows the bar graph of average decryption time. Fig. 12: Average decryption time for video data 9) Throughput at decryption side (video) Fig. 13: Comparison of throughput at encryption side (video) 10) Throughput at decryption side (video) In the graph below, throughput for decryption side is drawn. Fig. 14: Comparison of throughput at decryption side (video) From the above plot, it is observed that the throughput at encryption end of enhanced AES is more than that of AES algorithm. V. CONCLUSION The main goal of this thesis is to improve the throughput and security of the AES algorithm with the design of the enhanced AES algorithm and to compress the encrypted data so as to transfer the data fast over the network. This paper presented an enhanced AES algorithm along with a lossless compression technique. Algorithm is implemented for audio and video data. The encrypted data is further compressed by J-Bit Encoding, a lossless compression algorithm. Results shows that the algorithm requires less encryption and decryption time to process audio and video files as compare to conventional AES.The algorithm gives improved throughput than conventional AES. REFERENCES [1] Rohan Rayarikar, Sanket Upadhyay, Priyanka Pimpale, “SMS Encryption Using AES Algorithm on Android”, International Journal of Advanced Computer Applications, Vol.50, No.19, July 2012. [2] G. Ramesh, Dr.R Umarani, “ A Survey on Various Most Common Encryption Techniques ”,International Journal of Advanced Research in Computer Science and Software Engineering,Vol.2,No.2,March-April 2012. [3] M. Anand Kumar, Dr.S.Karthikeyan, “Investing The Efficiency of Blowfish and Rajindael (AES) Algorithms”, International Journal of Engineering Research and Applications, Vol.22, No.28, Feburary 2012. [4] Ritu Pahal, Vikas Kumar, “Efficiencnt Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.7, July 2013. [5] Milind Mathur, Ayush Kesarwani,“ Comparison between DES , 3DES , RC2 , RC6 , Blowfish and AES ”,Proceedings of National Conference on New Horizons in IT - NCNHIT 2013. [6] Jawahar Thakur, Nagesh Kumar, “AES, DES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol.1, Issue 2, Dec 2011. 183000 184000 185000 186000 187000 188000 189000 190000 191000 192000 193000 AES Enhanced AES Time(ms) Cryptographic algorithm 19.5 20 20.5 21 21.5 22 22.5 AES Enhanced AES Throughput(MB/ms) Cryptographic algorithm 17.9 18 18.1 18.2 18.3 18.4 18.5 18.6 18.7 18.8 AES Enhanced AES Throughput(MB/ms) Cryptographic algorithm
  • 7. Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit Algorithm (IJSRD/Vol. 2/Issue 08/2014/039) All rights reserved by www.ijsrd.com 165 [7] B. Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES And RSA Algorithm along with LSB Substitution Technique”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064. [8] Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey, “Comparative Study of Different Encryption Techniques on MP3 Compression”, International Journal of Computer Applications (0975 – 8887) Vol.26, No.3, July 2011. [9] Agus Dwi Suarjaya, “A New Algorithm for Data Compression Optimization”, International Journal of Advanced Computer Science and Applications, Vol.3, No.8, 2012. [10]Hyubgun Lee, Kyounghwa Lee, Yongtae Shin, “AES Implementation and Performance Evaluation on 8-bit Microcontrollers”, International Journal of Computer Science and Information Security, Vol. 6, No.1, 2009. [11]R.Gnanajeyaraman, K. Prasadh, Dr. Ramar, “Audio encryption using higher dimensional chaotic map ”, International Journal of Recent Trends in Engineering, Vol. 1, No. 2,May 2009 [12]Swati Paliwal, Ravindra Gupta, “A Review of Some Popular Encryption Techniques”, International Journal of Advanced Computer Science and Applications, Vol.3, No.2, Feb 2013. [13]S.Pavithra and Mrs. E. Ramadevi, “Performance Evaluation of Symmetric Algorithms”, Vol.3, No.8, Aug 2012. [14]E. Thambiraja, G. Ramesh, DR. R. Umarani, “ A Survey on Various Most Common encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2,Issue7, July2012. [15]Manpreet Kaur, Ms. Sukhpreet Kaur, “ Survey of Various Encryption Techniques for Audio Data”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 5, May 2014. [16]Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader and Mohiy Mohamed Hadhoud, “Evaluating The Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, Vol.10, No.3, May 2010.