Výsledky vyhľadávania - AES-CFB algorithm
-
1
An Efficient Security System for CABAC Bin-Strings of H.264/SVC
ISSN: 1051-8215, 1558-2205Vydavateľské údaje: New York, NY IEEE 01.03.2013Vydané v IEEE transactions on circuits and systems for video technology (01.03.2013)“…The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we…”
Získať plný text
Journal Article -
2
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys
ISSN: 0942-4962, 1432-1882Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2022Vydané v Multimedia systems (01.10.2022)“… In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback…”
Získať plný text
Journal Article -
3
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings
ISSN: 1520-9210, 1941-0077Vydavateľské údaje: New York, NY IEEE 01.01.2014Vydané v IEEE transactions on multimedia (01.01.2014)“… Hence they cannot be concatenated together to create plaintext for the CFB (Cipher Feedback) mode of AES, which is a self-synchronizing stream cipher for so-called AES-CFB…”
Získať plný text
Journal Article -
4
Securing medical images : A crypto-watermarking and biometrics based scheme
Vydavateľské údaje: IEEE 08.05.2022Vydané v 2022 7th International Conference on Image and Signal Processing and their Applications (ISPA) (08.05.2022)“… Therefore, we developed in this paper a crypto-watermarking and biometrics scheme. An AES-CFB encryption algorithm using a 256 bits key generated from hashed extracted biometric feature…”
Získať plný text
Konferenčný príspevok.. -
5
Secure H.264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B)
Vydavateľské údaje: IEEE 01.10.2016Vydané v TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time…”
Získať plný text
Konferenčný príspevok.. -
6
An enhancement method based on modifying CFB mode for key generation in AES algorithm
ISSN: 1681-6900, 2412-0758Vydavateľské údaje: Baghdad, Iraq University of Technology 01.06.2016Vydané v Engineering and Technology Journal (01.06.2016)“… This research aims to enhance the key generation of Advanced Encryption Standard (AES) algorithm with high efficiency…”
Získať plný text
Journal Article -
7
Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI
ISSN: 2407-389X, 2715-7393Vydavateľské údaje: 30.12.2021Vydané v JURIKOM (Jurnal Riset Komputer) (30.12.2021)“… In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data…”
Získať plný text
Journal Article -
8
Independent Protection of Different Layers in Spatially Scalable Video Coding
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2012Vydané v Procedia computer science (2012)“… Advanced encryption standard (AES) algorithm in Cipher…”
Získať plný text
Journal Article -
9
The Design and Analysis of the Key-Stream Generator Based on the AES
ISBN: 9783038350941, 303835094XISSN: 1660-9336, 1662-7482, 1662-7482Vydavateľské údaje: Zurich Trans Tech Publications Ltd 01.06.2014Vydané v Applied Mechanics and Materials (01.06.2014)“… This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift…”
Získať plný text
Journal Article -
10
Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes
ISSN: 2085-6830, 2087-5886Vydavateľské údaje: Bandung School of Electrical Engineering and Informatics, Bandung Institute of Techonolgy, Indonesia 01.12.2020Vydané v International Journal on Electrical Engineering and Informatics (01.12.2020)“… AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption…”
Získať plný text
Journal Article -
11
A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications
ISSN: 0030-4026, 1618-1336Vydavateľské údaje: Elsevier GmbH 01.08.2023Vydané v Optik (Stuttgart) (01.08.2023)“…Ten years ago, biometrics became an efficient tool of security and authentication enforcement. In a classical access system, a user can easily change password…”
Získať plný text
Journal Article -
12
A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications
ISSN: 0030-4026, 1618-1336Vydavateľské údaje: Elsevier GmbH 01.05.2022Vydané v Optik (Stuttgart) (01.05.2022)“…The need for high-speed and secure multi-biometric systems has grown in the last few decades. The progress in Internet applications and computer networks has…”
Získať plný text
Journal Article -
13
Communication of Confidential Documents Through Email using Hybrid and Key-Exchange Algorithm
Vydavateľské údaje: IEEE 23.02.2023Vydané v 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) (23.02.2023)“… The existing PGP protocol uses RSA algorithm, it is not user-friendly, more complex in nature, slow encryption and both users need to use the same version of software…”
Získať plný text
Konferenčný príspevok.. -
14
A Selective Video Encryption Scheme Based on Coding Characteristics
ISSN: 2073-8994, 2073-8994Vydavateľské údaje: 01.03.2020Vydané v Symmetry (Basel) (01.03.2020)“…The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information…”
Získať plný text
Journal Article -
15
Selective encryption of C2DVLC of AVS video coding standard for I & P frames
ISBN: 9781424474912, 1424474914ISSN: 1945-7871Vydavateľské údaje: IEEE 01.07.2010Vydané v 2010 IEEE International Conference on Multimedia and Expo (01.07.2010)“…) algorithm with the Cipher Feedback (CFB) mode on a subset of codewords. C2DVLC serves the purpose of encryption step without affecting the coding efficiency of AVS…”
Získať plný text
Konferenčný príspevok.. -
16
An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools
Vydavateľské údaje: IEEE 21.05.2021Vydané v 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (21.05.2021)“…Steganography is a method and technique of concealing existence of communication by embedding secret messages in digital media such as images, videos,…”
Získať plný text
Konferenčný príspevok.. -
17
Dynamic Data Masking by Two-Step Encryption
ISSN: 2770-7946Vydavateľské údaje: IEEE 11.10.2023Vydané v Innovations in Intelligent Systems and Applications Conference (Online) (11.10.2023)“… This provides a robust layer of protection by transforming data into an unreadable format using cryptographic algorithms…”
Získať plný text
Konferenčný príspevok.. -
18
针对分组密码工作模式的基于持久性故障的碰撞攻击
ISSN: 2097-4116Vydavateľské údaje: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023Vydané v Journal of Cryptologic Research (01.02.2023)“…基于持久性故障的碰撞攻击可以有效恢复 AES 加密/解密模块 (基于 S 盒实现) 中使用的密钥. 现实中处理长消息需要调用相应的工作模式, 不能满足基于持久性故障的碰撞攻击的前提假设. 此外, 广泛应用的开源密码库 OpenSSL中 AES 密码模块采用多个 T 盒而非 S 盒实现, 导致已有的持久性故障注入模式失效…”
Získať plný text
Journal Article -
19
Calculation of encryption algorithm combination for video encryption using two layers of AHP
Vydavateľské údaje: IEEE 01.10.2016Vydané v TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc…”
Získať plný text
Konferenčný príspevok.. -
20
Group diffie hellman key exchange algorithm based secure group communication
Vydavateľské údaje: IEEE 01.12.2017Vydané v 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (01.12.2017)“… Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm…”
Získať plný text
Konferenčný príspevok..

