tailieunhanh - A study on different approaches of selective encryption technique

This technique also provides quick security by only encrypting a selected portion of a bit stream. Selective encryption technique is one of the most promising solutions to increase the speed of encryption as compared to the full encryption. | ISSN:2249-5789 Saurabh Sharma et al , International Journal of Computer Science & Communication Networks,Vol 2(6), 658-662 A Study on Different Approaches of Selective Encryption Technique Saurabh Sharma Student (Computer Science) Lovely Professional University Phagwara, India saurabh4362@ Pushpendra Kumar Pateriya Assistant Professor (Computer Science) Lovely Professional University Phagwara, India Abstract Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encryption techniques are slow. Selective encryption is a technique to save computational power, overhead, speed, time. This technique also provides quick security by only encrypting a selected portion of a bit stream. Selective encryption technique is one of the most promising solutions to increase the speed of encryption as compared to the full encryption. Selective encryption is helpful for the multimedia content like images, video content and audio content. So this document discussed about Selective encryption technique which is used to increase the speed of encryption as compared to the full encryption. Keywords: Selective encryption, Encryption, Decryption 1. Introduction In this era, the communication through multimedia components is on demand. The data like text, images, video and audio is communicated through network. Cryptographic techniques are used to provide the protection of data and information while transmission of data over the network. The various algorithms are available for the security Services like Confidentiality, Data Integrity, and Authentication to protect against the attacks, for examples: - release of .