Výsledky vyhledávání - AES-CFB algorithm
-
1
An Efficient Security System for CABAC Bin-Strings of H.264/SVC
ISSN: 1051-8215, 1558-2205Vydáno: New York, NY IEEE 01.03.2013Vydáno v IEEE transactions on circuits and systems for video technology (01.03.2013)“…The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we…”
Získat plný text
Journal Article -
2
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys
ISSN: 0942-4962, 1432-1882Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2022Vydáno v Multimedia systems (01.10.2022)“… In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback…”
Získat plný text
Journal Article -
3
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings
ISSN: 1520-9210, 1941-0077Vydáno: New York, NY IEEE 01.01.2014Vydáno v IEEE transactions on multimedia (01.01.2014)“… Hence they cannot be concatenated together to create plaintext for the CFB (Cipher Feedback) mode of AES, which is a self-synchronizing stream cipher for so-called AES-CFB…”
Získat plný text
Journal Article -
4
Securing medical images : A crypto-watermarking and biometrics based scheme
Vydáno: IEEE 08.05.2022Vydáno v 2022 7th International Conference on Image and Signal Processing and their Applications (ISPA) (08.05.2022)“… Therefore, we developed in this paper a crypto-watermarking and biometrics scheme. An AES-CFB encryption algorithm using a 256 bits key generated from hashed extracted biometric feature…”
Získat plný text
Konferenční příspěvek -
5
Secure H.264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B)
Vydáno: IEEE 01.10.2016Vydáno v TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… Another important aspect to consider is the security of the video. For optimal applications, we should find an encryption algorithm with good combination of security, performance and encryption time…”
Získat plný text
Konferenční příspěvek -
6
An enhancement method based on modifying CFB mode for key generation in AES algorithm
ISSN: 1681-6900, 2412-0758Vydáno: Baghdad, Iraq University of Technology 01.06.2016Vydáno v Engineering and Technology Journal (01.06.2016)“… This research aims to enhance the key generation of Advanced Encryption Standard (AES) algorithm with high efficiency…”
Získat plný text
Journal Article -
7
Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI
ISSN: 2407-389X, 2715-7393Vydáno: 30.12.2021Vydáno v JURIKOM (Jurnal Riset Komputer) (30.12.2021)“… In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data…”
Získat plný text
Journal Article -
8
Independent Protection of Different Layers in Spatially Scalable Video Coding
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2012Vydáno v Procedia computer science (2012)“… Advanced encryption standard (AES) algorithm in Cipher…”
Získat plný text
Journal Article -
9
The Design and Analysis of the Key-Stream Generator Based on the AES
ISBN: 9783038350941, 303835094XISSN: 1660-9336, 1662-7482, 1662-7482Vydáno: Zurich Trans Tech Publications Ltd 01.06.2014Vydáno v Applied Mechanics and Materials (01.06.2014)“… This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift…”
Získat plný text
Journal Article -
10
Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes
ISSN: 2085-6830, 2087-5886Vydáno: Bandung School of Electrical Engineering and Informatics, Bandung Institute of Techonolgy, Indonesia 01.12.2020Vydáno v International Journal on Electrical Engineering and Informatics (01.12.2020)“… AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption…”
Získat plný text
Journal Article -
11
A novel cancellable biometric recognition system based on Rubik’s cube technique for cyber-security applications
ISSN: 0030-4026, 1618-1336Vydáno: Elsevier GmbH 01.08.2023Vydáno v Optik (Stuttgart) (01.08.2023)“…Ten years ago, biometrics became an efficient tool of security and authentication enforcement. In a classical access system, a user can easily change password…”
Získat plný text
Journal Article -
12
A hybrid encryption framework based on Rubik’s cube for cancelable biometric cyber security applications
ISSN: 0030-4026, 1618-1336Vydáno: Elsevier GmbH 01.05.2022Vydáno v Optik (Stuttgart) (01.05.2022)“…The need for high-speed and secure multi-biometric systems has grown in the last few decades. The progress in Internet applications and computer networks has…”
Získat plný text
Journal Article -
13
Communication of Confidential Documents Through Email using Hybrid and Key-Exchange Algorithm
Vydáno: IEEE 23.02.2023Vydáno v 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) (23.02.2023)“… The existing PGP protocol uses RSA algorithm, it is not user-friendly, more complex in nature, slow encryption and both users need to use the same version of software…”
Získat plný text
Konferenční příspěvek -
14
A Selective Video Encryption Scheme Based on Coding Characteristics
ISSN: 2073-8994, 2073-8994Vydáno: 01.03.2020Vydáno v Symmetry (Basel) (01.03.2020)“…The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information…”
Získat plný text
Journal Article -
15
Selective encryption of C2DVLC of AVS video coding standard for I & P frames
ISBN: 9781424474912, 1424474914ISSN: 1945-7871Vydáno: IEEE 01.07.2010Vydáno v 2010 IEEE International Conference on Multimedia and Expo (01.07.2010)“…) algorithm with the Cipher Feedback (CFB) mode on a subset of codewords. C2DVLC serves the purpose of encryption step without affecting the coding efficiency of AVS…”
Získat plný text
Konferenční příspěvek -
16
An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools
Vydáno: IEEE 21.05.2021Vydáno v 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (21.05.2021)“…Steganography is a method and technique of concealing existence of communication by embedding secret messages in digital media such as images, videos,…”
Získat plný text
Konferenční příspěvek -
17
Dynamic Data Masking by Two-Step Encryption
ISSN: 2770-7946Vydáno: IEEE 11.10.2023Vydáno v Innovations in Intelligent Systems and Applications Conference (Online) (11.10.2023)“… This provides a robust layer of protection by transforming data into an unreadable format using cryptographic algorithms…”
Získat plný text
Konferenční příspěvek -
18
针对分组密码工作模式的基于持久性故障的碰撞攻击
ISSN: 2097-4116Vydáno: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023Vydáno v Journal of Cryptologic Research (01.02.2023)“…基于持久性故障的碰撞攻击可以有效恢复 AES 加密/解密模块 (基于 S 盒实现) 中使用的密钥. 现实中处理长消息需要调用相应的工作模式, 不能满足基于持久性故障的碰撞攻击的前提假设. 此外, 广泛应用的开源密码库 OpenSSL中 AES 密码模块采用多个 T 盒而非 S 盒实现, 导致已有的持久性故障注入模式失效…”
Získat plný text
Journal Article -
19
Calculation of encryption algorithm combination for video encryption using two layers of AHP
Vydáno: IEEE 01.10.2016Vydáno v TSSA : proceeding of 2016 10th International Conference on Telecommunication Systems Services and Applications : October 6-7, 2016, Grand Inna Kuta, Denpasar-Bali, Indonesia (01.10.2016)“… There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc…”
Získat plný text
Konferenční příspěvek -
20
Group diffie hellman key exchange algorithm based secure group communication
Vydáno: IEEE 01.12.2017Vydáno v 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (01.12.2017)“… Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm…”
Získat plný text
Konferenční příspěvek

