[PDF][PDF] Secure network communication based on text-to-image encryption

A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a
network where all computers are connected together. In such a network a computer is …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

Block cipher encryption for text-to-image algorithm

AS Abusukhon - International Journal of Computer Engineering & …, 2013 - sdbindex.com
The Internet is now providing many online services. These online services need both a client
and a server to communicate with each other (this model is known as a client-server model) …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

A novel network security algorithm based on private key encryption

A Abusukhon, M Talib - … on Cyber Security, Cyber Warfare and …, 2012 - ieeexplore.ieee.org
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

A review paper for the role of cryptography in network security

J Alshehri, A Alhamed - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Protecting the security and privacy of data has become extremely important in this period,
especially with the increase in new technologies and the adoption of government and …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

[PDF][PDF] Image encryption using different techniques for high security transmission over a network

MSQ Khizrai, S Bodkhe - … Journal of Engineering Research and General …, 2014 - Citeseer
Digital image is a collection of the pixel with different intensity values, and each image is in
the form of n* m, no of pixel (where n, m is no of Rows and Column) when we transfer a …