# SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION

@article{Abusukhon2012SECURENC, title={SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION}, author={Ahmad Abusukhon and Issa Ottoum Mohamad Talib}, journal={International Journal of Cyber-Security and Digital Forensics}, year={2012}, volume={1}, pages={263-271} }

Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the IP address of another host and thus sends packets to a certain machine causing it to take some sort of action. In order to overcome this problem cryptography is used. In cryptographic application, the… Expand

No Paper Link Available

#### 18 Citations

BLOCK CIPHER ENCRYPTION FOR TEXT-TO-IMAGE ALGORITHM

- Computer Science
- 2013

This paper proposes the Block-Cipher TTIE (B-TTIE) algorithm, a data encryption algorithm that creates a secure path through the Internet making it difficult for hackers to guess the original text message. Expand

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

- Computer Science
- 2019

This paper proposes adding a new security level to the TTIE algorithm called the Diffie Hellman Text-to-Image Encryption algorithm (DHTTIE), and tests and analyses the proposed algorithm. Expand

A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

- Computer Science
- 2015

A novel method for data encryption based on the transformation of a text message into a barcode image is proposed and tested and the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed. Expand

Distributed Text-to-Image Encryption Algorithm

- Computer Science
- 2014

The speed up of the proposed TTIE algorithm DTTIE is calculated and it is found that the dominant time is the storage time, i.e., saving images on the hard disk when a large data collection is used. Expand

New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value

- Computer Science
- 2020 Seventh International Conference on Software Defined Systems (SDS)
- 2020

This survey sheds light on the recent work carried out on encrypting a text into an image based on the RGB color value and held a comparison between them based on various factors evolved from the literature. Expand

Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models

- Computer Science
- 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)
- 2019

This paper proposes an efficient and secure AKA protocol which is based on the ideas of the hashed MQV, the YAK protocol as a robust key agreement based on public key authentication and multiple session keys and generates multiple common keys per a session. Expand

Use the Singular Values Decomposition in the Text Encryption with Encryption Key Is Real Number

- Computer Science
- 2016

This paper encrypted text based on SVD algorithm, and in the first stage specific numbers suggested for each letters and punctuation characters are used instead of each character to encrypt the text. Expand

Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain

- Computer Science
- Wirel. Pers. Commun.
- 2020

A new substitution technique using multiple S-boxes with dynamic substitution is proposed and the proposed discrete wavelet transform based scheme is employed to reduce the encryption computational time. Expand

N-TEA: New Text Encryption Algorithm—Secured Data Exchange

- Computer Science
- 2014

The proposed N-TEA algorithm is adequate for real-time applications, resisting many kinds of attacks such as the Brute Force, Meet-in-the-Middle, and Birthday attacks. Expand

A Novel Text Encryption Algorithm

- Computer Science
- Res. Comput. Sci.
- 2013

This work proposes the Alpha-Beta associative memories, in particular, the cyphertext does not have the same dimension that the plaintext, therefore, since the beginning the encrypted text has a different meaning. Expand

#### References

SHOWING 1-10 OF 19 REFERENCES

A method for obtaining digital signatures and public-key cryptosystems

- Computer Science
- CACM
- 1983

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important… Expand

A method for obtaining digital signatures and public-key cryptosystems

- Computer Science
- CACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

- Computer Science
- 2006

A new type of hybrid encryption technique using AES-Rijndael for encryption and decryption and RSA used for key management is proposed, which is focused on single trusted authority using public key cryptography RSA in EAP. Expand

DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING

- Computer Science
- 2011

A scheme has been proposed which uses the concept of compression and data encryption which can reduce data size, increase data transfer rate and provide the security during communication. Expand

Parallel authentication and public-key encryption

- Computer Science, Mathematics
- 2003

Two schemes of parallel signcryption are proposed, which are efficient alternative to Commit-then-Sign-and-Encrypt (CtE&S) and both are both provably secure in the random oracle model. Expand

EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE

- Computer Science
- 2010

A new technique on matrix scrambling which is based on random function, shifting and reversing techniques of circular queue is proposed, which has a very fast encryption speed and the key space is expanded and it can resist all kinds of cryptanalytic, statistical attacks. Expand

Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method

- Computer Science
- 2010

Koblitz’s method to represent a message to a point and viceversa is discussed, and implementation results of Koblitz's Encoding and Decoding methods are described. Expand

A security framework for privacy-preserving data aggregation in wireless sensor networks

- Computer Science
- TOSN
- 2011

The proposed security model is sufficiently general to cover most application scenarios and constructions of privacy-preserving data aggregation and an impossibility result on achieving security against adaptive chosen ciphertext attacks in CDA/PDA is shown. Expand

Protecting Computer Network with Encryption Technique: A Study

- Computer Science
- UCMA
- 2011

The encryption has very wide applications for securing data and latest authentication deals with biometric application such as fingerprint and retina scan. Expand

Cryptography and Network Security: Principles and Practice

- Computer Science
- 1998

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In… Expand