A Secure Video Encryption Technique Using Rijndael Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

The transmission of digital content using the images increased consequently in past decades. Secure transmission of data through multimedia has increased much more. Hence; to ensure the security of the data to be transmitted; encryption techniques were used to convert the data into unintelligible format. Encryption takes place almost within every format; with many techniques and algorithms. In this paper; a method for encryption in video is taken place by using the AES Rijndael encryption algorithm. Instead of using the text or the images; the video encoding is taken place here. The video is converted into number of frames; which in turn converted to blocks used for encryption. The division of video resulted in images in turn this image is followed by encryption. The block cipher algorithm is used for converting frames to blocks. The Rijndael algorithm is used; because of its simplicity; efficient working syntax. Since; Rijndael algorithm is specified substitution ciphers were used to encrypt the given frames.

Keywords: Multimedia formats, Encryption, Video encryption, Frames, Block Cipher

Edition: Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

Share this Article

How to Cite this Article?

N. Geetha, K. Mahesh, "A Secure Video Encryption Technique Using Rijndael Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132227, Volume 3 Issue 5, May 2014, 1732 - 1734

125 PDF Views | 98 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 169 , Downloads: 92 | CTR: 54 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'Video encryption'

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Views: 158 , Downloads: 104 | CTR: 66 %

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article

Views: 145 , Downloads: 108 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article

Similar Articles with Keyword 'Frames'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 135 , Downloads: 96 | CTR: 71 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1624 - 1627

Video Segmentation Using Global Motion Estimation and Compensation

Pallavi R. Wagh, Shubhangi Vaikole

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1362 - 1364

Application Research and Penetration Testing on WebSocket Technology

Priyali Mishra, J. Jeysree

Share this Article

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2250 - 2253

Survey on Fast and Intelligent Deep Web Crawler Using Machine Learning Approach

Kalyani Thodage

Share this Article

Similar Articles with Keyword 'Block Cipher'

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 130 , Downloads: 108 | CTR: 83 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3182 - 3187

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase, Sapna Khapre

Share this Article

Views: 142 , Downloads: 110 | CTR: 77 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article

Views: 140 , Downloads: 115 | CTR: 82 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this Article

Views: 132 , Downloads: 128 | CTR: 97 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 90 - 95

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Stebin Sunny, Chinju Jacob, Justin Jose T

Share this Article
Top