Corpus ID: 2804389

SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION

@article{Abusukhon2012SECURENC,
  title={SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION},
  author={A. Abusukhon and Issa Ottoum Mohamad Talib},
  journal={International Journal of Cyber-Security and Digital Forensics},
  year={2012},
  volume={1},
  pages={263-271}
}
Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the IP address of another host and thus sends packets to a certain machine causing it to take some sort of action. In order to overcome this problem cryptography is used. In cryptographic application, the… Expand
BLOCK CIPHER ENCRYPTION FOR TEXT-TO-IMAGE ALGORITHM
TLDR
This paper proposes the Block-Cipher TTIE (B-TTIE) algorithm, a data encryption algorithm that creates a secure path through the Internet making it difficult for hackers to guess the original text message. Expand
A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
TLDR
This paper proposes adding a new security level to the TTIE algorithm called the Diffie Hellman Text-to-Image Encryption algorithm (DHTTIE), and tests and analyses the proposed algorithm. Expand
A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
TLDR
A novel method for data encryption based on the transformation of a text message into a barcode image is proposed and tested and the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed. Expand
Distributed Text-to-Image Encryption Algorithm
TLDR
The speed up of the proposed TTIE algorithm DTTIE is calculated and it is found that the dominant time is the storage time, i.e., saving images on the hard disk when a large data collection is used. Expand
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
TLDR
This survey sheds light on the recent work carried out on encrypting a text into an image based on the RGB color value and held a comparison between them based on various factors evolved from the literature. Expand
Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models
TLDR
This paper proposes an efficient and secure AKA protocol which is based on the ideas of the hashed MQV, the YAK protocol as a robust key agreement based on public key authentication and multiple session keys and generates multiple common keys per a session. Expand
Use the Singular Values Decomposition in the Text Encryption with Encryption Key Is Real Number
TLDR
This paper encrypted text based on SVD algorithm, and in the first stage specific numbers suggested for each letters and punctuation characters are used instead of each character to encrypt the text. Expand
Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain
TLDR
A new substitution technique using multiple S-boxes with dynamic substitution is proposed and the proposed discrete wavelet transform based scheme is employed to reduce the encryption computational time. Expand
N-TEA: New Text Encryption Algorithm—Secured Data Exchange
TLDR
The proposed N-TEA algorithm is adequate for real-time applications, resisting many kinds of attacks such as the Brute Force, Meet-in-the-Middle, and Birthday attacks. Expand
A Novel Text Encryption Algorithm
TLDR
This work proposes the Alpha-Beta associative memories, in particular, the cyphertext does not have the same dimension that the plaintext, therefore, since the beginning the encrypted text has a different meaning. Expand
...
1
2
...

References

SHOWING 1-10 OF 19 REFERENCES
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two importantExpand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking
TLDR
A new type of hybrid encryption technique using AES-Rijndael for encryption and decryption and RSA used for key management is proposed, which is focused on single trusted authority using public key cryptography RSA in EAP. Expand
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
TLDR
A scheme has been proposed which uses the concept of compression and data encryption which can reduce data size, increase data transfer rate and provide the security during communication. Expand
Parallel authentication and public-key encryption
TLDR
Two schemes of parallel signcryption are proposed, which are efficient alternative to Commit-then-Sign-and-Encrypt (CtE&S) and both are both provably secure in the random oracle model. Expand
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
TLDR
A new technique on matrix scrambling which is based on random function, shifting and reversing techniques of circular queue is proposed, which has a very fast encryption speed and the key space is expanded and it can resist all kinds of cryptanalytic, statistical attacks. Expand
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method
TLDR
Koblitz’s method to represent a message to a point and viceversa is discussed, and implementation results of Koblitz's Encoding and Decoding methods are described. Expand
A security framework for privacy-preserving data aggregation in wireless sensor networks
TLDR
The proposed security model is sufficiently general to cover most application scenarios and constructions of privacy-preserving data aggregation and an impossibility result on achieving security against adaptive chosen ciphertext attacks in CDA/PDA is shown. Expand
Protecting Computer Network with Encryption Technique: A Study
TLDR
The encryption has very wide applications for securing data and latest authentication deals with biometric application such as fingerprint and retina scan. Expand
Cryptography and Network Security: Principles and Practice
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. InExpand
...
1
2
...