نتایج جستجو برای: multimedia encryption systems

تعداد نتایج: 1232148  

Journal: :IJCSA 2016
Alexander Uskov Adam Byerly Colleen Heinemann

The Intel® Advanced Encryption Standard (AES) New Instructions (AES-NI) were designed to implement some of the complex and performance intensive steps of the AES encryption/decryption algorithm (cipher) using hardware acceleration. This paper presents the outcomes of a research project aimed at encryption/decryption analysis of the AES cipher in ECB, CBC, OFB, CFB, and CTR modes of operation on...

2010
Thomas Stütz Andreas Uhl

In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the ...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2022

Cloud technology is advancing at a rapid pace. Many applications and multimedia data are hosted in the cloud, Security, confidentiality, efficiency key drawbacks of cloud computing. There variety access control systems on market to secure cloud. But generation time major flaw both multi-authority single authority systems. Cipher policy attribute-based encryption (CPABE) one many cryptographic a...

2018

Recently, security of multimedia data is receiving more and more attention due to the transmission over various communication networks. In order to protect personal information, many image encryption algorithms are designed and proposed such as twodimensional cellular automata based method,1,2 Henon chaotic map,3,4 Chen’s hyperchaotic system,5 Arnold transform.6,7 Chaotic functions are blessed ...

2011
Shaimaa A. El-said Khalid F. A. Hussein Mohamed M. Fouad

Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-modelbased compression method to generate different...

2017
Amina Msolli Haythem Ameur Abdelhamid Helali

The security in wireless multimedia sensor network is a crucial challenge engendered by environmental, material constraint requirements and the energy consumption. Standard encryption algorithms do not agree with the real-time applications on this network. One of the solutions to the challenges mentioned above is to maintain the safety and reduce the energy consumption. In this article, a new a...

2013
Siu F. Yeung John C.S. Lui David K.Y. Yau

Because of limited server and network capacities in multimedia streaming, proxies are commonly used to cache multimedia objects such that, by accessing nearby proxies, clients can enjoy smaller start-up latencies and reduced packet loss and delay jitters for their requests. However, the use of video proxies increases the risk that multimedia data are exposed to unauthorized access by intruders....

Background: Above all methods effective learning results from decent training, acquired in the proper environment and encouraging creative methods. Computer-assisted training by educational software is considered a fundamental measure to improve medical and dentistry education systems. This study aims to design and assess fixed dental prostheses via 2 multimedia instructional contents at the Gu...

2014
Y. Benlcouiri M. Benabdellah M. C. Ismaili

Issues of security and compression of transmitted data have become an important concern in multimedia technology. In this study, we propose an efficient approach to secure video sequences in real time using the method of choosing reference images that is based on the Faber-schauder Multi-scale Transform to reduce the data flow. The encryption step is based on the principle of affine encryption ...

2014
Mohit Kumar Akshat Aggarwal Ankit Garg

Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise des...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید