Open Access   Article Go Back

Ameliorate Large Video Enigma for Promulgation

Dinesh S1 , Padmavathi H G2 , C.S. Madhu3 , Divyashree H S4 , Bharath Raj D5

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 596-600, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.596600

Online published on Feb 28, 2019

Copyright © Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D, “Ameliorate Large Video Enigma for Promulgation,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.596-600, 2019.

MLA Style Citation: Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D "Ameliorate Large Video Enigma for Promulgation." International Journal of Computer Sciences and Engineering 7.2 (2019): 596-600.

APA Style Citation: Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D, (2019). Ameliorate Large Video Enigma for Promulgation. International Journal of Computer Sciences and Engineering, 7(2), 596-600.

BibTex Style Citation:
@article{S_2019,
author = {Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D},
title = {Ameliorate Large Video Enigma for Promulgation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {596-600},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3710},
doi = {https://doi.org/10.26438/ijcse/v7i2.596600}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.596600}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3710
TI - Ameliorate Large Video Enigma for Promulgation
T2 - International Journal of Computer Sciences and Engineering
AU - Dinesh S, Padmavathi H G, C.S. Madhu, Divyashree H S, Bharath Raj D
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 596-600
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
409 188 downloads 104 downloads
  
  
           

Abstract

The usability of images and videos is increased in a remarkable speed which built the fear of insecurity in the minds of end users. To revamp the security and bandwidth, allocation, while promulgation of data. A new concept has put forward to provide two levels of security by minimizing the size of the video using the compression algorithm and to encrypt it by using the Blow fish algorithm. This proposed Algorithm takes less memory Uses simple operations like XOR and additions, This algorithm improves significant efficiency

Key-Words / Index Term

Promulgation, Feistal network, Key expansion, Enigma

References

[1] Vaibhav Poonia, Dr. Narendra Singh Yadav, “Analysis of modified Blowfish Algorithm in different cases with various parameters”, International Conference on Advanced Computing and Communication Systems (ICACCS -2015), Jan. 05 – 07, 2015..
[2] Mohammad Ali Bani Younes and Aman Jantan ,Image Encryption Using Block-Based Transformation Algorithm, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03
[3] Pia Singh and Prof. Karamjeet Singh “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013K.A.Sugeng,
[4] M.Dinesh And Dr.P.Suveetha Dhanaselvam,” Real Time Image Encryption And Decryption Using Blowfish Algorithm”, International Journal Of Emerging Technology In Computer Science & Electronics (Ijetcse) Issn: 0976-1353 Volume 22 Issue 2 – May 2016.
[5] Ankita Verma, Paramita Guha, Sunita Mishra,’’ Comparative Study Of Different Cryptographic Algorithms’’, International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs), Volume 5, Issue 2, March - April 2016.
[6] Pia Singh, Prof. Karamjeet Singh,” Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, nternational Of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
[7] S.G.K.D.N. Samaratunge, ―”New EnigmaTechnique for Palette Based Images”,In Second International Conference onIndustrial and InformationSystems, pp. 335-340, Aug. 8 –11,2007.
[8] J. He, S. Tang and T. Wu, ―”An Adaptive Image EnigmaBasedon Depth-Varying Embedding”, In Congress on Image and SignalProcessing, vol. 5, pp. 660-663, 27-30 May 2008.
[9] S Roy and D.G. Akka, “On complementary edge magic of certaingraphs”, American Journal of Mathematics and Statistics 2012,2(3):22-26.
[10] Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.