(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Image Processing and Computer Vision (TIPCV)

ISSN (Print):    ISSN (Online):2455-4707
Volume-9 Issue-25 May-2023
Full-Text PDF
Paper Title : Enhancing video encryption: AES and blowfish algorithms with random password generation
Author Name : Shyam Babu Sah and Sandhya Gawade
Abstract :

This paper explores the integration of AES and Blowfish algorithms for video encryption, utilizing a random password generation process to enhance efficiency in encryption and decryption. The study compares the results through various methodologies. One category assesses data using RGB buffer calculations, demonstrating that minimal RGB buffer variations ensure accurate encryption, making it suitable for video protection. Significant differences between original and encrypted image RGB attributes highlight robust encryption. The proposed approach combines AES's adaptability and Blowfish's efficiency, demonstrating their effectiveness for safeguarding sensitive digital content. The research advances video security within the contemporary digital landscape, addressing the imperative need for robust encryption techniques to protect valuable data during transmission and storage.

Keywords : AES, Blowfish, RGB buffer, Data security.
Cite this article : Sah SB, Gawade S. Enhancing video encryption: AES and blowfish algorithms with random password generation. ACCENTS Transactions on Image Processing and Computer Vision. 2023; 9 (25): 9-14. DOI:10.19101/TIPCV.2023.924002.
References :
[1]Dibas H, Sabri KE. A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In international conference on information technology 2021 (pp. 344-9). IEEE.
[Crossref] [Google Scholar]
[2]Patel K. Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. International Journal of Information Technology. 2019; 11:813-9.
[Crossref] [Google Scholar]
[3]Wajgade VM, Kumar DS. Enhancing data security using video steganography. International Journal of Emerging Technology and Advanced Engineering. 2013; 3(4):549-52.
[Google Scholar]
[4]Alexan W, Hemeida F. Security through blowfish and lsb bit–cycling with mathematical sequences. In signal processing: algorithms, architectures, arrangements, and applications 2019 (pp. 229-34). IEEE.
[Crossref] [Google Scholar]
[5]Assa-Agyei K, Olajide F. A comparative study of twofish, blowfish, and advanced encryption standard for secured data transmission. International Journal of Advanced Computer Science and Applications. 2023; 14(3):393-98.
[Crossref] [Google Scholar]
[6]Elkandoz MT, Alexan W, Hussein HH. Double-layer image security scheme with aggregated mathematical sequences. In international conference on advanced communication technologies and networking 2019 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[7]Singh AK, Alshehri M, Bhushan S, Kumar M, Alfarraj O, Pardarshani KR. Secure and energy efficient data transmission model for WSN. Intelligent Automation & Soft Computing. 2021; 27(3):761-9.
[Crossref] [Google Scholar]
[8]Commey D, Griffith S, Dzisi J. Performance comparison of 3DES, AES, Blowfish and RSA for dataset classification and encryption in cloud data storage. International Journal of Computer Applications. 2020; 177(40):17-22.
[Google Scholar]
[9]Husein AM, Harahap M, Dharma A, Simarmata AM. Hybrid-AES-Blowfish algorithm: key exchange using neural network. In international conference of computer science and information technology 2019 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[10]Ahmad R, Mohamed Omar MF, Rajendran J, Ismail W. Performance analysis of enhanced AES-128 and blowfish algorithms through parallel-pipelined-memory techniques. Wireless Personal Communications. 2022; 127(4):3615-35.
[Crossref] [Google Scholar]
[11]Joseph T, Kalaiselvan SA, Aswathy SU, Radhakrishnan R, Shamna AR. Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing. 2021; 12(6):6141-9.
[Crossref] [Google Scholar]
[12]Wahid SD, Buja AG, Jono MN, Aziz AA. Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(74):73-81.
[Google Scholar]
[13]Kumar A, Kumar SA, Dutt V, Kumar Dubey A, Narang S. A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies. International Journal of Interactive Multimedia and Artificial Intelligence.2022; 8(2):150-7.
[Crossref] [Google Scholar]
[14]Kurniawan DE, Iqbal M, Friadi J, Hidayat F, Permatasari RD. Login security using one time password (OTP) application with encryption algorithm performance. In journal of physics: conference series 2021 (p. 012041). IOP Publishing.
[Crossref] [Google Scholar]
[15]Rehman S, Talat Bajwa N, Shah MA, Aseeri AO, Anjum A. Hybrid AES-ECC model for the security of data over cloud storage. Electronics. 2021; 10(21):2673.
[Crossref] [Google Scholar]
[16]Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019; 7:82721-43.
[Crossref] [Google Scholar]
[17]Kumar S, Kumar D, Singh N. Performance and security analysis using B-128 modified blowfish algorithm. Multimedia Tools and Applications. 2023:1-8.
[Crossref] [Google Scholar]
[18]Sridhar S, Smys S. Hybrid RSAECC based secure communication in mobile cloud environment. Wireless Personal Communications. 2020; 111(1):429-42.
[Crossref] [Google Scholar]
[19]Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-6.
[Crossref] [Google Scholar]
[20]Aggarwal S, Chaudhary R, Aujla GS, Kumar N, Choo KK, Zomaya AY. Blockchain for smart communities: applications, challenges and opportunities. Journal of Network and Computer Applications. 2019; 144:13-48.
[Crossref] [Google Scholar]
[21]Dubey AK, Giri M, Sahare M, Dubey AK. Step-up analysis and generalization approach for trusted NFC application development for enhancing real time use Location. In international conference on communication systems and network technologies 2011 (pp. 318-22). IEEE.
[Crossref] [Google Scholar]
[22]Goyal M, Sharma A. Implementation and analysis of various encryption techniques with blowfish on various data files. In international conference on technological advancements and innovations 2021 (pp. 541-6). IEEE.
[Crossref] [Google Scholar]
[23]Goyal M, Sharma A. Enhancing hybrid encryption techniques for secured data processing for small medium enterprises in cloud. In international conference on technology, research, and innovation for betterment of society 2021 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[24]Shakeel M, Sirisha A, Joshi A, Ushasree R, Vaishnavi M, Verma D. An analysis of different cryptocraphy techniques and the role of coding and information theories in overcoming security threats. In 5th international conference on contemporary computing and informatics 2022 (pp. 223-8). IEEE.
[Crossref] [Google Scholar]
[25]Vishnoi A, Aggarwal A, Prasad A, Prateek M, Aggarwal S. Text encryption for lower bandwidth channels: design and implementation. In third international conference on intelligent computing instrumentation and control technologies 2022 (pp. 1460-4). IEEE.
[Crossref] [Google Scholar]
[26]Parida D, Bhanja U. Smart meters: cyber security issues and their solutions. In 2nd international conference on vision towards emerging trends in communication and networking technologies 2023 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[27]Yadav V, Kumar M. Key cryptographic methods in the cloud: a comparative study. In 3rd international conference on intelligent communication and computational techniques 2023 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[28]Souror WW, Fouad M, Takieldeen AE. Hybrid-blowfish security strengths using side channel countermeasures. In international telecommunications conference 2023 (pp. 314-21). IEEE.
[Crossref] [Google Scholar]
[29]Susmitha C, Srineeharika S, Laasya KS, Kannaiah SK, Bulla S. Hybrid cryptography for secure file storage. In 7th international conference on computing methodologies and communication 2023 (pp. 1151-6). IEEE.
[Crossref] [Google Scholar]