A Secure Video Encryption Technique Using Rijndael Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

The transmission of digital content using the images increased consequently in past decades. Secure transmission of data through multimedia has increased much more. Hence; to ensure the security of the data to be transmitted; encryption techniques were used to convert the data into unintelligible format. Encryption takes place almost within every format; with many techniques and algorithms. In this paper; a method for encryption in video is taken place by using the AES Rijndael encryption algorithm. Instead of using the text or the images; the video encoding is taken place here. The video is converted into number of frames; which in turn converted to blocks used for encryption. The division of video resulted in images in turn this image is followed by encryption. The block cipher algorithm is used for converting frames to blocks. The Rijndael algorithm is used; because of its simplicity; efficient working syntax. Since; Rijndael algorithm is specified substitution ciphers were used to encrypt the given frames.

Keywords: Multimedia formats, Encryption, Video encryption, Frames, Block Cipher

Edition: Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

Share this Article

How to Cite this Article?

N. Geetha, K. Mahesh, "A Secure Video Encryption Technique Using Rijndael Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132227, Volume 3 Issue 5, May 2014, 1732 - 1734

99 PDF Views | 77 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Similar Articles with Keyword 'Video encryption'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article

Similar Articles with Keyword 'Frames'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2250 - 2253

Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach

Kalyani Thodage

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1624 - 1627

Video Segmentation Using Global Motion Estimation and Compensation

Pallavi R. Wagh, Shubhangi Vaikole

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Similar Articles with Keyword 'Block Cipher'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3182 - 3187

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase, Sapna Khapre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 90 - 95

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Stebin Sunny, Chinju Jacob, Justin Jose T

Share this Article
Top