Ameliorate Large Video Enigma for Promulgation
DOI:
https://doi.org/10.26438/ijcse/v7i2.596600Keywords:
Promulgation, Feistal network, Key expansion, EnigmaAbstract
he usability of images and videos is increased in a remarkable speed which built the fear of insecurity in the minds of end users. To revamp the security and bandwidth, allocation, while promulgation of data. A new concept has put forward to provide two levels of security by minimizing the size of the video using the compression algorithm and to encrypt it by using the Blow fish algorithm. This proposed Algorithm takes less memory Uses simple operations like XOR and additions, This algorithm improves significant efficiency.
References
[1] Vaibhav Poonia, Dr. Narendra Singh Yadav, “Analysis of modified Blowfish Algorithm in different cases with various parameters”, International Conference on Advanced Computing and Communication Systems (ICACCS -2015), Jan. 05 – 07, 2015..
[2] Mohammad Ali Bani Younes and Aman Jantan ,Image Encryption Using Block-Based Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
[3] Pia Singh and Prof. Karamjeet Singh “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013K.A.Sugeng,
[4] M.Dinesh And Dr.P.Suveetha Dhanaselvam,” Real Time Image Encryption And Decryption Using Blowfish Algorithm”, International Journal Of Emerging Technology In Computer Science & Electronics (Ijetcse) Issn: 0976-1353 Volume 22 Issue 2 – May 2016.
[5] Ankita Verma, Paramita Guha, Sunita Mishra,’’ Comparative Study Of Different Cryptographic Algorithms’’, International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs), Volume 5, Issue 2, March - April 2016.
[6] Pia Singh, Prof. Karamjeet Singh,” Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, nternational Of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
[7] S.G.K.D.N. Samaratunge, ―”New EnigmaTechnique for Palette Based Images”,In Second International Conference onIndustrial and InformationSystems, pp. 335-340, Aug. 8 –11,2007.
[8] J. He, S. Tang and T. Wu, ―”An Adaptive Image EnigmaBasedon Depth-Varying Embedding”, In Congress on Image and SignalProcessing, vol. 5, pp. 660-663, 27-30 May 2008.
[9] S Roy and D.G. Akka, “On complementary edge magic of certaingraphs”, American Journal of Mathematics and Statistics 2012,2(3):22-26.
[10] Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
