New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.

A Abusukhon, B Hawashin, M Lafi - … of Advances in Soft Computing & Its …, 2021 - i-csrs.org
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …

[PDF][PDF] A secure network communication protocol based on text to barcode encryption algorithm

A Ahmad, B Hawashin - International Journal of Advanced …, 2015 - researchgate.net
There are various methods for securing data on the internet and ensuring its privacy; one of
these methods is data encryption. This technique is used to protect the data from hackers by …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

Pixel based method for Text to Image Encryption

K Malathi, R Kavitha, MK Liza - 2020 4th International …, 2020 - ieeexplore.ieee.org
Normally, the encryption and decryption is done only to convert the text into an encrypted
form (ie) the confused form of text. In this type of method a hacker may easily hack the text …