نتایج جستجو برای: multimedia encryption systems
تعداد نتایج: 1232148 فیلتر نتایج به سال:
The Intel® Advanced Encryption Standard (AES) New Instructions (AES-NI) were designed to implement some of the complex and performance intensive steps of the AES encryption/decryption algorithm (cipher) using hardware acceleration. This paper presents the outcomes of a research project aimed at encryption/decryption analysis of the AES cipher in ECB, CBC, OFB, CFB, and CTR modes of operation on...
In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the ...
Cloud technology is advancing at a rapid pace. Many applications and multimedia data are hosted in the cloud, Security, confidentiality, efficiency key drawbacks of cloud computing. There variety access control systems on market to secure cloud. But generation time major flaw both multi-authority single authority systems. Cipher policy attribute-based encryption (CPABE) one many cryptographic a...
Recently, security of multimedia data is receiving more and more attention due to the transmission over various communication networks. In order to protect personal information, many image encryption algorithms are designed and proposed such as twodimensional cellular automata based method,1,2 Henon chaotic map,3,4 Chen’s hyperchaotic system,5 Arnold transform.6,7 Chaotic functions are blessed ...
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-modelbased compression method to generate different...
The security in wireless multimedia sensor network is a crucial challenge engendered by environmental, material constraint requirements and the energy consumption. Standard encryption algorithms do not agree with the real-time applications on this network. One of the solutions to the challenges mentioned above is to maintain the safety and reduce the energy consumption. In this article, a new a...
Because of limited server and network capacities in multimedia streaming, proxies are commonly used to cache multimedia objects such that, by accessing nearby proxies, clients can enjoy smaller start-up latencies and reduced packet loss and delay jitters for their requests. However, the use of video proxies increases the risk that multimedia data are exposed to unauthorized access by intruders....
Background: Above all methods effective learning results from decent training, acquired in the proper environment and encouraging creative methods. Computer-assisted training by educational software is considered a fundamental measure to improve medical and dentistry education systems. This study aims to design and assess fixed dental prostheses via 2 multimedia instructional contents at the Gu...
Issues of security and compression of transmitted data have become an important concern in multimedia technology. In this study, we propose an efficient approach to secure video sequences in real time using the method of choosing reference images that is based on the Faber-schauder Multi-scale Transform to reduce the data flow. The encryption step is based on the principle of affine encryption ...
Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise des...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید