Abstract-Cryptography and encryptions, these terms are now-a-days have an unseen impact in the emerging field of network and its security. As security of data on any kind of system has became the first priority for the organization, the methods which are used to ensure security not only need to be strong and efficient, but should also be easy to execute and implemented. With progress in technology, encryption came up with a big boom, taken as a weapon of ultimate security. It is an earliest art and it is defined as the science of writing in secret code. Basically, the cryptography algorithms are categorized into two types on the basis of key management, which are key-oriented and keyless encryption algorithms. The prime goal leading the design of an encryption algorithm must provide security against unauthorized attacks. Key-oriented algorithms are very efficient but they were very bulky to manage as key handling must be done. Due to the great overhead, keyless algorithms seem an attractive option. But what about security by keyless, here is the solution-KUDOS encryption, which is a keyless security algorithm to provide ultimate security at the one level above of key-oriented.
Abstract-Present era is the information age where information is money and its security is the primary concern. If the organization has faster access to accurate and up-to-date information then correct business decisions can be taken in time to achieve business excellence and uphold an edge over competitors. Various kinds of security mechanisms like cryptography and steganography are extensively employed to keep the information secure and to send it over the network. However cryptography approach is more widely implied than steganography approach because of enhanced security and simplicity. Fundamental goal of any cryptographic algorithm is to provide defence against unauthorized attacks. In this paper, we have proposed a new image encryption algorithm named Stream Encryption Standard for Digital Images (SES) for meeting the requirements of secure image transfer. The results of several experimental and statistical analysis demonstrate that the proposed image encryption scheme provides a proficient and secure way for image encryption. This new algorithm is based on the symmetric key encryption approach.
Abstract-This paper approaches security application for digital image and video processing. The techniques involve H.264 Video Compression, Elliptical Curve Cryptography Encryption followed by Image Interleaving and last by Pixel Integration to generate integrated multivideo. The user can choose any of the videos among the several integrated videos displayed with a unique security key for each video. With the secure key assigned for each video input, the original video is displayed by decrypting it from multiple videos.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.