Výsledky vyhledávání - AES-CFB algorithm

  1. 1

    An Efficient Security System for CABAC Bin-Strings of H.264/SVC Autor Asghar, M. N., Ghanbari, M.

    ISSN: 1051-8215, 1558-2205
    Vydáno: New York, NY IEEE 01.03.2013
    “…The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we…”
    Získat plný text
    Journal Article
  2. 2

    Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys Autor Lin, Chih-Hsueh, Hu, Guo-Hsin, Chen, Jie-Sheng, Yan, Jun-Juh, Tang, Kuang-Hui

    ISSN: 0942-4962, 1432-1882
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2022
    Vydáno v Multimedia systems (01.10.2022)
    “… In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback…”
    Získat plný text
    Journal Article
  3. 3

    Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings Autor Shahid, Zafar, Puech, William

    ISSN: 1520-9210, 1941-0077
    Vydáno: New York, NY IEEE 01.01.2014
    Vydáno v IEEE transactions on multimedia (01.01.2014)
    “… Hence they cannot be concatenated together to create plaintext for the CFB (Cipher Feedback) mode of AES, which is a self-synchronizing stream cipher for so-called AES-CFB…”
    Získat plný text
    Journal Article
  4. 4

    Securing medical images : A crypto-watermarking and biometrics based scheme Autor Megaiz, Nassima Jamila, Djebbari, Abdelghani

    Vydáno: IEEE 08.05.2022
    “… Therefore, we developed in this paper a crypto-watermarking and biometrics scheme. An AES-CFB encryption algorithm using a 256 bits key generated from hashed extracted biometric feature…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    Secure H.264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B) Autor Adiguna, Tahta, Hendrawan

    Vydáno: IEEE 01.10.2016
    “… Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    An enhancement method based on modifying CFB mode for key generation in AES algorithm Autor Abd Allah, Hasanayn S., al-Rawi, Maha A. Hammud, Hammud, Dalal N.

    ISSN: 1681-6900, 2412-0758
    Vydáno: Baghdad, Iraq University of Technology 01.06.2016
    Vydáno v Engineering and Technology Journal (01.06.2016)
    “… This research aims to enhance the key generation of Advanced Encryption Standard (AES) algorithm with high efficiency…”
    Získat plný text
    Journal Article
  7. 7

    Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI Autor Hidayati, Layli Nur, Fitriana, Gita Fadila, Adam, Ipam Fuadina

    ISSN: 2407-389X, 2715-7393
    Vydáno: 30.12.2021
    Vydáno v JURIKOM (Jurnal Riset Komputer) (30.12.2021)
    “… In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data…”
    Získat plný text
    Journal Article
  8. 8

    Independent Protection of Different Layers in Spatially Scalable Video Coding Autor Abu-Zahra, Ala, Shahid, Zafar, Rattrout, Amjad, Puech, William

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2012
    Vydáno v Procedia computer science (2012)
    “… Advanced encryption standard (AES) algorithm in Cipher…”
    Získat plný text
    Journal Article
  9. 9

    The Design and Analysis of the Key-Stream Generator Based on the AES Autor Qian, Xu Dong, Gong, Jing, Shi, Hui, Lu, Jian Wei, Deng, Yuan Qing

    ISBN: 9783038350941, 303835094X
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Vydáno: Zurich Trans Tech Publications Ltd 01.06.2014
    Vydáno v Applied Mechanics and Materials (01.06.2014)
    “… This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift…”
    Získat plný text
    Journal Article
  10. 10

    Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes Autor Saidi, Riad, Bentahar, Tarek, Cherrid, Nada, Bentahar, Atef, Mayache, Hichem

    ISSN: 2085-6830, 2087-5886
    Vydáno: Bandung School of Electrical Engineering and Informatics, Bandung Institute of Techonolgy, Indonesia 01.12.2020
    “… AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption…”
    Získat plný text
    Journal Article
  11. 11

    A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications Autor Helmy, Mai, El-Rabaie, El-Sayed M., El-Dokany, Ibrahim, Abd El-Samie, Fathi E.

    ISSN: 0030-4026, 1618-1336
    Vydáno: Elsevier GmbH 01.08.2023
    Vydáno v Optik (Stuttgart) (01.08.2023)
    “…Ten years ago, biometrics became an efficient tool of security and authentication enforcement. In a classical access system, a user can easily change password…”
    Získat plný text
    Journal Article
  12. 12

    A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications Autor Helmy, Mai, El-Shafai, Walid, El-Rabaie, El-Sayed M., El-Dokany, Ibrahim M., El-Samie, Fathi E. Abd

    ISSN: 0030-4026, 1618-1336
    Vydáno: Elsevier GmbH 01.05.2022
    Vydáno v Optik (Stuttgart) (01.05.2022)
    “…The need for high-speed and secure multi-biometric systems has grown in the last few decades. The progress in Internet applications and computer networks has…”
    Získat plný text
    Journal Article
  13. 13

    Communication of Confidential Documents Through Email using Hybrid and Key-Exchange Algorithm Autor S, Kavitha Bharathi, D, Arun Kumar, T, Madhan, M, Murugananth

    Vydáno: IEEE 23.02.2023
    “… The existing PGP protocol uses RSA algorithm, it is not user-friendly, more complex in nature, slow encryption and both users need to use the same version of software…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    A Selective Video Encryption Scheme Based on Coding Characteristics Autor Cheng, Shuli, Wang, Liejun, Ao, Naixiang, Han, Qingqing

    ISSN: 2073-8994, 2073-8994
    Vydáno: 01.03.2020
    Vydáno v Symmetry (Basel) (01.03.2020)
    “…The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information…”
    Získat plný text
    Journal Article
  15. 15

    Selective encryption of C2DVLC of AVS video coding standard for I & P frames Autor Shahid, Z, Chaumont, M, Puech, W

    ISBN: 9781424474912, 1424474914
    ISSN: 1945-7871
    Vydáno: IEEE 01.07.2010
    “…) algorithm with the Cipher Feedback (CFB) mode on a subset of codewords. C2DVLC serves the purpose of encryption step without affecting the coding efficiency of AVS…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools Autor Bhuva, Bunty Dineshchandra, Zavarsky, Pavol, Butakov, Sergey

    Vydáno: IEEE 21.05.2021
    “…Steganography is a method and technique of concealing existence of communication by embedding secret messages in digital media such as images, videos,…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Dynamic Data Masking by Two-Step Encryption Autor Adak, M. Fatih, Kose, Zehra Nur, Akpinar, Mustafa

    ISSN: 2770-7946
    Vydáno: IEEE 11.10.2023
    “… This provides a robust layer of protection by transforming data into an unreadable format using cryptographic algorithms…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    针对分组密码工作模式的基于持久性故障的碰撞攻击 Autor Shou-Jin, ZANG, Shi-Hui, ZHENG, 臧首金, 郑世慧

    ISSN: 2097-4116
    Vydáno: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023
    Vydáno v Journal of Cryptologic Research (01.02.2023)
    “…基于持久性故障的碰撞攻击可以有效恢复 AES 加密/解密模块 (基于 S 盒实现) 中使用的密钥. 现实中处理长消息需要调用相应的工作模式, 不能满足基于持久性故障的碰撞攻击的前提假设. 此外, 广泛应用的开源密码库 OpenSSL中 AES 密码模块采用多个 T 盒而非 S 盒实现, 导致已有的持久性故障注入模式失效…”
    Získat plný text
    Journal Article
  19. 19
  20. 20

    Group diffie hellman key exchange algorithm based secure group communication Autor Sathyanarayana, S V, Lavanya, R

    Vydáno: IEEE 01.12.2017
    “… Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm…”
    Získat plný text
    Konferenční příspěvek