[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

[PDF][PDF] Secure network communication based on text-to-image encryption

A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a
network where all computers are connected together. In such a network a computer is …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

Block cipher encryption for text-to-image algorithm

AS Abusukhon - International Journal of Computer Engineering & …, 2013 - sdbindex.com
The Internet is now providing many online services. These online services need both a client
and a server to communicate with each other (this model is known as a client-server model) …

[PDF][PDF] An efficient technique for image encryption and decryption for secured multimedia application

AS Dongare, AS Alvi, NM Tarbani - International Research Journal …, 2017 - academia.edu
In the recent years, Internet multimedia applications have become very popular. The rapid
growth in the use of multimedia information has made the security of data storage and …

[PDF][PDF] A New Approach for Image Cryptography Techniques

H Singh, N Dhillon, SS Bains - … of Computer & …, 2013 - anthony-claretonwutalobi.com
With the progress in data exchange by electronic system, the need of information security
has become a necessity. Due to growth of multimedia applications, security becomes an …

[PDF][PDF] Combination of RGB substitution for text to image encryption technique using AES

S Singh, A Jain - Spvryans Int. J. Eng. Sci. Technol, 2015 - academia.edu
Network security works on the principle of Encryption and Decryption. Every algorithm make
use of a secret key which is responsible to Encrypt data in some unreadable type of …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …