Ameliorate Large Video Enigma for Promulgation

Authors

  • Dinesh S Department of Information Science & Engg, Brindavan College of Engineering, Bangalore, India
  • Padmavathi HG Department of Computer Science & Engg, Brindavan College of Engineering, Bangalore, India
  • Madhu CS Department of Computer Science & Engg, Brindavan College of Engineering, Bangalore, India
  • Divyashree HS Department of Computer Science & Engg, Brindavan College of Engineering, Bangalore, India
  • Raj BD Department of Information Science & Engg, Brindavan College of Engineering, Bangalore, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.596600

Keywords:

Promulgation, Feistal network, Key expansion, Enigma

Abstract

he usability of images and videos is increased in a remarkable speed which built the fear of insecurity in the minds of end users. To revamp the security and bandwidth, allocation, while promulgation of data. A new concept has put forward to provide two levels of security by minimizing the size of the video using the compression algorithm and to encrypt it by using the Blow fish algorithm. This proposed Algorithm takes less memory Uses simple operations like XOR and additions, This algorithm improves significant efficiency.

References

[1] Vaibhav Poonia, Dr. Narendra Singh Yadav, “Analysis of modified Blowfish Algorithm in different cases with various parameters”, International Conference on Advanced Computing and Communication Systems (ICACCS -2015), Jan. 05 – 07, 2015..

[2] Mohammad Ali Bani Younes and Aman Jantan ,Image Encryption Using Block-Based Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03

[3] Pia Singh and Prof. Karamjeet Singh “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013K.A.Sugeng,

[4] M.Dinesh And Dr.P.Suveetha Dhanaselvam,” Real Time Image Encryption And Decryption Using Blowfish Algorithm”, International Journal Of Emerging Technology In Computer Science & Electronics (Ijetcse) Issn: 0976-1353 Volume 22 Issue 2 – May 2016.

[5] Ankita Verma, Paramita Guha, Sunita Mishra,’’ Comparative Study Of Different Cryptographic Algorithms’’, International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs), Volume 5, Issue 2, March - April 2016.

[6] Pia Singh, Prof. Karamjeet Singh,” Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, nternational Of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.

[7] S.G.K.D.N. Samaratunge, ―”New EnigmaTechnique for Palette Based Images”,In Second International Conference onIndustrial and InformationSystems, pp. 335-340, Aug. 8 –11,2007.

[8] J. He, S. Tang and T. Wu, ―”An Adaptive Image EnigmaBasedon Depth-Varying Embedding”, In Congress on Image and SignalProcessing, vol. 5, pp. 660-663, 27-30 May 2008.

[9] S Roy and D.G. Akka, “On complementary edge magic of certaingraphs”, American Journal of Mathematics and Statistics 2012,2(3):22-26.

[10] Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.596600
Published: 2019-02-28

How to Cite

[1]
S. Dinesh, H. Padmavathi, C. Madhu, H. Divyashree, and B. D. Raj, “Ameliorate Large Video Enigma for Promulgation”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 596–600, Feb. 2019.