Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014
A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
The transmission of digital content using the images increased consequently in past decades. Secure transmission of data through multimedia has increased much more. Hence; to ensure the security of the data to be transmitted; encryption techniques were used to convert the data into unintelligible format. Encryption takes place almost within every format; with many techniques and algorithms. In this paper; a method for encryption in video is taken place by using the AES Rijndael encryption algorithm. Instead of using the text or the images; the video encoding is taken place here. The video is converted into number of frames; which in turn converted to blocks used for encryption. The division of video resulted in images in turn this image is followed by encryption. The block cipher algorithm is used for converting frames to blocks. The Rijndael algorithm is used; because of its simplicity; efficient working syntax. Since; Rijndael algorithm is specified substitution ciphers were used to encrypt the given frames.
Keywords: Multimedia formats, Encryption, Video encryption, Frames, Block Cipher
Edition: Volume 3 Issue 5, May 2014
Pages: 1732 - 1734
How to Cite this Article?
N. Geetha, K. Mahesh, "A Secure Video Encryption Technique Using Rijndael Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132227, Volume 3 Issue 5, May 2014, 1732 - 1734
125 PDF Views | 98 PDF Downloads
Similar Articles with Keyword 'Encryption'
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Views: 169 , Downloads: 92 | CTR: 54 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Similar Articles with Keyword 'Video encryption'
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙6
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
Views: 158 , Downloads: 104 | CTR: 66 %
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1435 - 1439Review on Encryption Techniques in Multimedia Data
Ashwini G. Kamble, Prof. Nikita J. Kulkarni
Views: 145 , Downloads: 108 | CTR: 74 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1939 - 1942An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio
Minal C. Toley, Mayur S.Burange
Similar Articles with Keyword 'Frames'
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Views: 135 , Downloads: 96 | CTR: 71 %
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1624 - 1627Video Segmentation Using Global Motion Estimation and Compensation
Pallavi R. Wagh, Shubhangi Vaikole
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1362 - 1364Application Research and Penetration Testing on WebSocket Technology
Priyali Mishra, J. Jeysree
Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2250 - 2253Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach
Kalyani Thodage
Similar Articles with Keyword 'Block Cipher'
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 130 , Downloads: 108 | CTR: 83 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3182 - 3187Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation
Punam Hiwase, Sapna Khapre
Views: 142 , Downloads: 110 | CTR: 77 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 733 - 736Review of a New Distinguishing Attack Using Block Cipher with a Neural Network
Vina M. Lomte, Archana D. Shinde
Views: 140 , Downloads: 115 | CTR: 82 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1082 - 1085Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography
Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi
Views: 132 , Downloads: 128 | CTR: 97 % | Weekly Popularity: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 90 - 95An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
Stebin Sunny, Chinju Jacob, Justin Jose T