ACCENTS Transactions on Image Processing and Computer Vision (TIPCV) ISSN (O): 2455-4707 Vol - 9, Issue - 25, May 2023

  1. Google Scholar

  2. Citation

  3. Impact Factor
Enhancing video encryption: AES and blowfish algorithms with random password generation

Shyam Babu Sah and Sandhya Gawade

Abstract

This paper explores the integration of AES and Blowfish algorithms for video encryption, utilizing a random password generation process to enhance efficiency in encryption and decryption. The study compares the results through various methodologies. One category assesses data using RGB buffer calculations, demonstrating that minimal RGB buffer variations ensure accurate encryption, making it suitable for video protection. Significant differences between original and encrypted image RGB attributes highlight robust encryption. The proposed approach combines AES's adaptability and Blowfish's efficiency, demonstrating their effectiveness for safeguarding sensitive digital content. The research advances video security within the contemporary digital landscape, addressing the imperative need for robust encryption techniques to protect valuable data during transmission and storage.

Keyword

AES, Blowfish, RGB buffer, Data security.

Cite this article

Sah SB, Gawade S

Refference

[1][1]Dibas H, Sabri KE. A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In international conference on information technology 2021 (pp. 344-9). IEEE.

[2][2]Patel K. Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. International Journal of Information Technology. 2019; 11:813-9.

[3][3]Wajgade VM, Kumar DS. Enhancing data security using video steganography. International Journal of Emerging Technology and Advanced Engineering. 2013; 3(4):549-52.

[4][4]Alexan W, Hemeida F. Security through blowfish and lsb bit–cycling with mathematical sequences. In signal processing: algorithms, architectures, arrangements, and applications 2019 (pp. 229-34). IEEE.

[5][5]Assa-Agyei K, Olajide F. A comparative study of twofish, blowfish, and advanced encryption standard for secured data transmission. International Journal of Advanced Computer Science and Applications. 2023; 14(3):393-98.

[6][6]Elkandoz MT, Alexan W, Hussein HH. Double-layer image security scheme with aggregated mathematical sequences. In international conference on advanced communication technologies and networking 2019 (pp. 1-7). IEEE.

[7][7]Singh AK, Alshehri M, Bhushan S, Kumar M, Alfarraj O, Pardarshani KR. Secure and energy efficient data transmission model for WSN. Intelligent Automation & Soft Computing. 2021; 27(3):761-9.

[8][8]Commey D, Griffith S, Dzisi J. Performance comparison of 3DES, AES, Blowfish and RSA for dataset classification and encryption in cloud data storage. International Journal of Computer Applications. 2020; 177(40):17-22.

[9][9]Husein AM, Harahap M, Dharma A, Simarmata AM. Hybrid-AES-Blowfish algorithm: key exchange using neural network. In international conference of computer science and information technology 2019 (pp. 1-4). IEEE.

[10][10]Ahmad R, Mohamed Omar MF, Rajendran J, Ismail W. Performance analysis of enhanced AES-128 and blowfish algorithms through parallel-pipelined-memory techniques. Wireless Personal Communications. 2022; 127(4):3615-35.

[11][11]Joseph T, Kalaiselvan SA, Aswathy SU, Radhakrishnan R, Shamna AR. Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing. 2021; 12(6):6141-9.

[12][12]Wahid SD, Buja AG, Jono MN, Aziz AA. Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(74):73-81.

[13][13]Kumar A, Kumar SA, Dutt V, Kumar Dubey A, Narang S. A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies. International Journal of Interactive Multimedia and Artificial Intelligence.2022; 8(2):150-7.

[14][14]Kurniawan DE, Iqbal M, Friadi J, Hidayat F, Permatasari RD. Login security using one time password (OTP) application with encryption algorithm performance. In journal of physics: conference series 2021 (p. 012041). IOP Publishing.

[15][15]Rehman S, Talat Bajwa N, Shah MA, Aseeri AO, Anjum A. Hybrid AES-ECC model for the security of data over cloud storage. Electronics. 2021; 10(21):2673.

[16][16]Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019; 7:82721-43.

[17][17]Kumar S, Kumar D, Singh N. Performance and security analysis using B-128 modified blowfish algorithm. Multimedia Tools and Applications. 2023:1-8.

[18][18]Sridhar S, Smys S. Hybrid RSAECC based secure communication in mobile cloud environment. Wireless Personal Communications. 2020; 111(1):429-42.

[19][19]Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-6.

[20][20]Aggarwal S, Chaudhary R, Aujla GS, Kumar N, Choo KK, Zomaya AY. Blockchain for smart communities: applications, challenges and opportunities. Journal of Network and Computer Applications. 2019; 144:13-48.

[21][21]Dubey AK, Giri M, Sahare M, Dubey AK. Step-up analysis and generalization approach for trusted NFC application development for enhancing real time use Location. In international conference on communication systems and network technologies 2011 (pp. 318-22). IEEE.

[22][22]Goyal M, Sharma A. Implementation and analysis of various encryption techniques with blowfish on various data files. In international conference on technological advancements and innovations 2021 (pp. 541-6). IEEE.

[23][23]Goyal M, Sharma A. Enhancing hybrid encryption techniques for secured data processing for small medium enterprises in cloud. In international conference on technology, research, and innovation for betterment of society 2021 (pp. 1-5). IEEE.

[24][24]Shakeel M, Sirisha A, Joshi A, Ushasree R, Vaishnavi M, Verma D. An analysis of different cryptocraphy techniques and the role of coding and information theories in overcoming security threats. In 5th international conference on contemporary computing and informatics 2022 (pp. 223-8). IEEE.

[25][25]Vishnoi A, Aggarwal A, Prasad A, Prateek M, Aggarwal S. Text encryption for lower bandwidth channels: design and implementation. In third international conference on intelligent computing instrumentation and control technologies 2022 (pp. 1460-4). IEEE.

[26][26]Parida D, Bhanja U. Smart meters: cyber security issues and their solutions. In 2nd international conference on vision towards emerging trends in communication and networking technologies 2023 (pp. 1-6). IEEE.

[27][27]Yadav V, Kumar M. Key cryptographic methods in the cloud: a comparative study. In 3rd international conference on intelligent communication and computational techniques 2023 (pp. 1-5). IEEE.

[28][28]Souror WW, Fouad M, Takieldeen AE. Hybrid-blowfish security strengths using side channel countermeasures. In international telecommunications conference 2023 (pp. 314-21). IEEE.

[29][29]Susmitha C, Srineeharika S, Laasya KS, Kannaiah SK, Bulla S. Hybrid cryptography for secure file storage. In 7th international conference on computing methodologies and communication 2023 (pp. 1151-6). IEEE.