Suchergebnisse - AES-CFB algorithm

  1. 1

    An Efficient Security System for CABAC Bin-Strings of H.264/SVC von Asghar, M. N., Ghanbari, M.

    ISSN: 1051-8215, 1558-2205
    Veröffentlicht: New York, NY IEEE 01.03.2013
    “… The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we …”
    Volltext
    Journal Article
  2. 2

    Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys von Lin, Chih-Hsueh, Hu, Guo-Hsin, Chen, Jie-Sheng, Yan, Jun-Juh, Tang, Kuang-Hui

    ISSN: 0942-4962, 1432-1882
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2022
    Veröffentlicht in Multimedia systems (01.10.2022)
    “… In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback …”
    Volltext
    Journal Article
  3. 3

    Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings von Shahid, Zafar, Puech, William

    ISSN: 1520-9210, 1941-0077
    Veröffentlicht: New York, NY IEEE 01.01.2014
    Veröffentlicht in IEEE transactions on multimedia (01.01.2014)
    “… Hence they cannot be concatenated together to create plaintext for the CFB (Cipher Feedback) mode of AES, which is a self-synchronizing stream cipher for so-called AES-CFB …”
    Volltext
    Journal Article
  4. 4

    Securing medical images : A crypto-watermarking and biometrics based scheme von Megaiz, Nassima Jamila, Djebbari, Abdelghani

    Veröffentlicht: IEEE 08.05.2022
    “… Therefore, we developed in this paper a crypto-watermarking and biometrics scheme. An AES-CFB encryption algorithm using a 256 bits key generated from hashed extracted biometric feature …”
    Volltext
    Tagungsbericht
  5. 5

    Secure H.264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B) von Adiguna, Tahta, Hendrawan

    Veröffentlicht: IEEE 01.10.2016
    “… Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time …”
    Volltext
    Tagungsbericht
  6. 6

    An enhancement method based on modifying CFB mode for key generation in AES algorithm von Abd Allah, Hasanayn S., al-Rawi, Maha A. Hammud, Hammud, Dalal N.

    ISSN: 1681-6900, 2412-0758
    Veröffentlicht: Baghdad, Iraq University of Technology 01.06.2016
    Veröffentlicht in Engineering and Technology Journal (01.06.2016)
    “… This research aims to enhance the key generation of Advanced Encryption Standard (AES) algorithm with high efficiency …”
    Volltext
    Journal Article
  7. 7

    Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI von Hidayati, Layli Nur, Fitriana, Gita Fadila, Adam, Ipam Fuadina

    ISSN: 2407-389X, 2715-7393
    Veröffentlicht: 30.12.2021
    Veröffentlicht in JURIKOM (Jurnal Riset Komputer) (30.12.2021)
    “… In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data …”
    Volltext
    Journal Article
  8. 8

    Independent Protection of Different Layers in Spatially Scalable Video Coding von Abu-Zahra, Ala, Shahid, Zafar, Rattrout, Amjad, Puech, William

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2012
    Veröffentlicht in Procedia computer science (2012)
    “… Advanced encryption standard (AES) algorithm in Cipher …”
    Volltext
    Journal Article
  9. 9

    The Design and Analysis of the Key-Stream Generator Based on the AES von Qian, Xu Dong, Gong, Jing, Shi, Hui, Lu, Jian Wei, Deng, Yuan Qing

    ISBN: 9783038350941, 303835094X
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2014
    Veröffentlicht in Applied Mechanics and Materials (01.06.2014)
    “… This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift …”
    Volltext
    Journal Article
  10. 10

    Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes von Saidi, Riad, Bentahar, Tarek, Cherrid, Nada, Bentahar, Atef, Mayache, Hichem

    ISSN: 2085-6830, 2087-5886
    Veröffentlicht: Bandung School of Electrical Engineering and Informatics, Bandung Institute of Techonolgy, Indonesia 01.12.2020
    “… AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption …”
    Volltext
    Journal Article
  11. 11

    A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications von Helmy, Mai, El-Rabaie, El-Sayed M., El-Dokany, Ibrahim, Abd El-Samie, Fathi E.

    ISSN: 0030-4026, 1618-1336
    Veröffentlicht: Elsevier GmbH 01.08.2023
    Veröffentlicht in Optik (Stuttgart) (01.08.2023)
    “… Ten years ago, biometrics became an efficient tool of security and authentication enforcement. In a classical access system, a user can easily change password …”
    Volltext
    Journal Article
  12. 12

    A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications von Helmy, Mai, El-Shafai, Walid, El-Rabaie, El-Sayed M., El-Dokany, Ibrahim M., El-Samie, Fathi E. Abd

    ISSN: 0030-4026, 1618-1336
    Veröffentlicht: Elsevier GmbH 01.05.2022
    Veröffentlicht in Optik (Stuttgart) (01.05.2022)
    “… The need for high-speed and secure multi-biometric systems has grown in the last few decades. The progress in Internet applications and computer networks has …”
    Volltext
    Journal Article
  13. 13

    Communication of Confidential Documents Through Email using Hybrid and Key-Exchange Algorithm von S, Kavitha Bharathi, D, Arun Kumar, T, Madhan, M, Murugananth

    Veröffentlicht: IEEE 23.02.2023
    “… The existing PGP protocol uses RSA algorithm, it is not user-friendly, more complex in nature, slow encryption and both users need to use the same version of software …”
    Volltext
    Tagungsbericht
  14. 14

    A Selective Video Encryption Scheme Based on Coding Characteristics von Cheng, Shuli, Wang, Liejun, Ao, Naixiang, Han, Qingqing

    ISSN: 2073-8994, 2073-8994
    Veröffentlicht: 01.03.2020
    Veröffentlicht in Symmetry (Basel) (01.03.2020)
    “… The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information …”
    Volltext
    Journal Article
  15. 15

    Selective encryption of C2DVLC of AVS video coding standard for I & P frames von Shahid, Z, Chaumont, M, Puech, W

    ISBN: 9781424474912, 1424474914
    ISSN: 1945-7871
    Veröffentlicht: IEEE 01.07.2010
    “… ) algorithm with the Cipher Feedback (CFB) mode on a subset of codewords. C2DVLC serves the purpose of encryption step without affecting the coding efficiency of AVS …”
    Volltext
    Tagungsbericht
  16. 16

    An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools von Bhuva, Bunty Dineshchandra, Zavarsky, Pavol, Butakov, Sergey

    Veröffentlicht: IEEE 21.05.2021
    “… Steganography is a method and technique of concealing existence of communication by embedding secret messages in digital media such as images, videos, …”
    Volltext
    Tagungsbericht
  17. 17

    Dynamic Data Masking by Two-Step Encryption von Adak, M. Fatih, Kose, Zehra Nur, Akpinar, Mustafa

    ISSN: 2770-7946
    Veröffentlicht: IEEE 11.10.2023
    “… This provides a robust layer of protection by transforming data into an unreadable format using cryptographic algorithms …”
    Volltext
    Tagungsbericht
  18. 18

    针对分组密码工作模式的基于持久性故障的碰撞攻击 von Shou-Jin, ZANG, Shi-Hui, ZHENG, 臧首金, 郑世慧

    ISSN: 2097-4116
    Veröffentlicht: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023
    Veröffentlicht in Journal of Cryptologic Research (01.02.2023)
    “… 基于持久性故障的碰撞攻击可以有效恢复 AES 加密/解密模块 (基于 S 盒实现) 中使用的密钥. 现实中处理长消息需要调用相应的工作模式, 不能满足基于持久性故障的碰撞攻击的前提假设. 此外, 广泛应用的开源密码库 OpenSSL中 AES 密码模块采用多个 T 盒而非 S 盒实现, 导致已有的持久性故障注入模式失效 …”
    Volltext
    Journal Article
  19. 19

    Calculation of encryption algorithm combination for video encryption using two layers of AHP von Mustafa, Alvin, Hendrawan

    Veröffentlicht: IEEE 01.10.2016
    “… There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc …”
    Volltext
    Tagungsbericht
  20. 20

    Group diffie hellman key exchange algorithm based secure group communication von Sathyanarayana, S V, Lavanya, R

    Veröffentlicht: IEEE 01.12.2017
    “… Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm …”
    Volltext
    Tagungsbericht