Search Results - AES-CFB algorithm
-
1
An Efficient Security System for CABAC Bin-Strings of H.264/SVC
ISSN: 1051-8215, 1558-2205Published: New York, NY IEEE 01.03.2013Published in IEEE transactions on circuits and systems for video technology (01.03.2013)“…The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we…”
Get full text
Journal Article -
2
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys
ISSN: 0942-4962, 1432-1882Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2022Published in Multimedia systems (01.10.2022)“… In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback…”
Get full text
Journal Article -
3
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings
ISSN: 1520-9210, 1941-0077Published: New York, NY IEEE 01.01.2014Published in IEEE transactions on multimedia (01.01.2014)“… Hence they cannot be concatenated together to create plaintext for the CFB (Cipher Feedback) mode of AES, which is a self-synchronizing stream cipher for so-called AES-CFB…”
Get full text
Journal Article -
4
Securing medical images : A crypto-watermarking and biometrics based scheme
Published: IEEE 08.05.2022Published in 2022 7th International Conference on Image and Signal Processing and their Applications (ISPA) (08.05.2022)“… Therefore, we developed in this paper a crypto-watermarking and biometrics scheme. An AES-CFB encryption algorithm using a 256 bits key generated from hashed extracted biometric feature…”
Get full text
Conference Proceeding -
5
Secure H.264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B)
Published: IEEE 01.10.2016Published in TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time…”
Get full text
Conference Proceeding -
6
An enhancement method based on modifying CFB mode for key generation in AES algorithm
ISSN: 1681-6900, 2412-0758Published: Baghdad, Iraq University of Technology 01.06.2016Published in Engineering and Technology Journal (01.06.2016)“… This research aims to enhance the key generation of Advanced Encryption Standard (AES) algorithm with high efficiency…”
Get full text
Journal Article -
7
Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI
ISSN: 2407-389X, 2715-7393Published: 30.12.2021Published in JURIKOM (Jurnal Riset Komputer) (30.12.2021)“… In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data…”
Get full text
Journal Article -
8
Independent Protection of Different Layers in Spatially Scalable Video Coding
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2012Published in Procedia computer science (2012)“… Advanced encryption standard (AES) algorithm in Cipher…”
Get full text
Journal Article -
9
The Design and Analysis of the Key-Stream Generator Based on the AES
ISBN: 9783038350941, 303835094XISSN: 1660-9336, 1662-7482, 1662-7482Published: Zurich Trans Tech Publications Ltd 01.06.2014Published in Applied Mechanics and Materials (01.06.2014)“… This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift…”
Get full text
Journal Article -
10
Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes
ISSN: 2085-6830, 2087-5886Published: Bandung School of Electrical Engineering and Informatics, Bandung Institute of Techonolgy, Indonesia 01.12.2020Published in International Journal on Electrical Engineering and Informatics (01.12.2020)“… AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption…”
Get full text
Journal Article -
11
A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications
ISSN: 0030-4026, 1618-1336Published: Elsevier GmbH 01.08.2023Published in Optik (Stuttgart) (01.08.2023)“…Ten years ago, biometrics became an efficient tool of security and authentication enforcement. In a classical access system, a user can easily change password…”
Get full text
Journal Article -
12
A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications
ISSN: 0030-4026, 1618-1336Published: Elsevier GmbH 01.05.2022Published in Optik (Stuttgart) (01.05.2022)“…The need for high-speed and secure multi-biometric systems has grown in the last few decades. The progress in Internet applications and computer networks has…”
Get full text
Journal Article -
13
Communication of Confidential Documents Through Email using Hybrid and Key-Exchange Algorithm
Published: IEEE 23.02.2023Published in 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) (23.02.2023)“… The existing PGP protocol uses RSA algorithm, it is not user-friendly, more complex in nature, slow encryption and both users need to use the same version of software…”
Get full text
Conference Proceeding -
14
A Selective Video Encryption Scheme Based on Coding Characteristics
ISSN: 2073-8994, 2073-8994Published: 01.03.2020Published in Symmetry (Basel) (01.03.2020)“…The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information…”
Get full text
Journal Article -
15
Selective encryption of C2DVLC of AVS video coding standard for I & P frames
ISBN: 9781424474912, 1424474914ISSN: 1945-7871Published: IEEE 01.07.2010Published in 2010 IEEE International Conference on Multimedia and Expo (01.07.2010)“…) algorithm with the Cipher Feedback (CFB) mode on a subset of codewords. C2DVLC serves the purpose of encryption step without affecting the coding efficiency of AVS…”
Get full text
Conference Proceeding -
16
An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools
Published: IEEE 21.05.2021Published in 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (21.05.2021)“…Steganography is a method and technique of concealing existence of communication by embedding secret messages in digital media such as images, videos,…”
Get full text
Conference Proceeding -
17
Dynamic Data Masking by Two-Step Encryption
ISSN: 2770-7946Published: IEEE 11.10.2023Published in Innovations in Intelligent Systems and Applications Conference (Online) (11.10.2023)“… This provides a robust layer of protection by transforming data into an unreadable format using cryptographic algorithms…”
Get full text
Conference Proceeding -
18
Calculation of encryption algorithm combination for video encryption using two layers of AHP
Published: IEEE 01.10.2016Published in TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc…”
Get full text
Conference Proceeding -
19
Group diffie hellman key exchange algorithm based secure group communication
Published: IEEE 01.12.2017Published in 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (01.12.2017)“… Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm…”
Get full text
Conference Proceeding -
20
针对分组密码工作模式的基于持久性故障的碰撞攻击
ISSN: 2097-4116Published: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023Published in Journal of Cryptologic Research (01.02.2023)“…基于持久性故障的碰撞攻击可以有效恢复 AES 加密/解密模块 (基于 S 盒实现) 中使用的密钥. 现实中处理长消息需要调用相应的工作模式, 不能满足基于持久性故障的碰撞攻击的前提假设. 此外, 广泛应用的开源密码库 OpenSSL中 AES 密码模块采用多个 T 盒而非 S 盒实现, 导致已有的持久性故障注入模式失效…”
Get full text
Journal Article

