A Study on Different Approaches of Selective Encryption Technique
نویسندگان
چکیده
Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encryption techniques are slow. Selective encryption is a technique to save computational power, overhead, speed, time. This technique also provides quick security by only encrypting a selected portion of a bit stream. Selective encryption technique is one of the most promising solutions to increase the speed of encryption as compared to the full encryption. Selective encryption is helpful for the multimedia content like images, video content and audio content. So this document discussed about Selective encryption technique which is used to increase the speed of encryption as compared to the full encryption.
منابع مشابه
RSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملThe Effect of Semantic Mapping as a Vocabulary Instruction Technique on EFL Learners with Different Perceptual Learning Styles
Traditional and modern vocabulary instruction techniques have been introduced in the past few decades to improve the learners’ performance in reading comprehension. Semantic mapping, which entails drawing learners’ attention to the interrelationships among lexical items through graphic organizers, is claimed to enhance vocabulary learning significantly. However, whether this technique suits all...
متن کاملProposing a Model for Evaluating Gate Valve Cover Manufacturing Methods by Value Engineering and Data Envelopment Analysis Approaches with aCase Study in Petro Tajhiz-e-Sepahan Company
This research aims at presenting a consolidated model of data envelopment analysis (DEA) technique and value engineering to select the best manufacturing methods for gate valve covers and ranking the methods using TOPSIS.To do so, efficiency evaluation indices were selected based on the value engineering approach and different manufacturing methods were evaluated using DEA technique.Finally, ef...
متن کامل