Text encryption based on Huffman coding and ElGamal cryptosystem

KM Singh, LD Singh, T Tuithung - Recent Patents on …, 2021 - ingentaconnect.com
Background: Data that are in the form of text, audio, image, and video are used everywhere
in our modern scientific world. These data are stored in physical storage, cloud storage and …

[PDF][PDF] A New Approach to Encryption using Huffman Coding

S Gupta, NS Mathur, P Chauhan - International Journal of …, 2016 - academia.edu
In today's world, where Digital Communication is becoming an integral part of everyone's
life, cyber security has become a challenge. There are various threats to the data being sent …

[PDF][PDF] Text encryption with huffman compression

N Sangwan - International Journal of Computer Applications, 2012 - Citeseer
Communication between a sender and receiver needs security. It can be done in any form,
like plain text or binary data. Changing the information to some unidentifiable form, can save …

A Novel Approach of Text Encryption Using Random Numbers and Hash Table

AK Das, N Kar - Advances in Cyber Security: Second International …, 2021 - Springer
In modern days, word files are used to carry out information storage and other multiple
operations. The word file allows the users to write valuable text and information in plain text …

A Review of Text Encryption Techniques

H Agrawal, M Sharma - Asian Journal of Computer …, 2014 - informaciontechnologica.com
In the today world, security is required to transmit confidential information over the network.
Security is also demanding in wide range of applications. Cryptographic algorithms play a …

[PDF][PDF] Randomized text encryption: A new dimension in cryptography

J Memon, MZ Abd Rozan, M Uddin… - … on Computers and …, 2014 - researchgate.net
Cryptography refers to protecting transmitted information from unauthorized interception or
tampering, while cryptanalysis is art of breaking such secret ciphers and reading …

A novel image encryption scheme with Huffman encoding and steganography technique

M Kumari, V Pawar, P Kumar - … Journal of Network Security & Its …, 2019 - papers.ssrn.com
In today's day and age when everything is done with the aid of computing technology, the
need for confidential communication has drastically increased. Not only the sensitive data …

Implementation of textual information encryption using 128, 192 and 256 bits advanced encryption standard algorithm

OC Abikoye, QA Garba… - Annals. Computer Science …, 2017 - eprints.lmu.edu.ng
Individual or organizational sensitive data and information need to be prevented from
unauthorized access. Several reports of middle man attacks and intrusion in form of hacking …

[PDF][PDF] Word-based encryption algorithm using dictionary indexing with variable encryption key length

A Al-Jarrah, A Albsharat, M Al-Jarrah - International Journal of …, 2022 - academia.edu
This paper proposes a new algorithm for text encryption utilizing English words as a unit of
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …

A review and analysis on text data encryption techniques

S Kumar, K Patidar, R Kushwah… - International Journal of …, 2017 - search.proquest.com
In the current age there is need of data security in every field. This paper deals with text data
security. In this area there are several research works have already been done and some in …