A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

Modern and Lightweight Component-based Symmetric Cipher Algorithms

SA Qassir, MT Gaata, AT Sadiq - ARO-The Scientific …, 2022 - eprints.koyauniversity.org
Information security, being one of the corner stones of network and communication
technology, has been evolving tremendously to cope with the parallel evolution of network …

A novel network security algorithm based on private key encryption

A Abusukhon, M Talib - … on Cyber Security, Cyber Warfare and …, 2012 - ieeexplore.ieee.org
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …

A review paper: Text-to-image cryptography in color coding

NS Noor, DA Hammood, A Al-Naji - AIP Conference Proceedings, 2023 - pubs.aip.org
Encryption techniques are important on the Internet. The challenges of color-coding are still
hot topics. Many papers were published to develop encryption algorithms to prevent security …

Attack penetration system for SQL injection

M Kaushik, G Ojha - International journal of advanced …, 2014 - search.proquest.com
The SQL Injection attack is a popular way of attack, in terms of document structure and
common threats now a day. There are several ways of attack detection, as per this study and …

[PDF][PDF] Secure network communication based on text-to-image encryption

A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a
network where all computers are connected together. In such a network a computer is …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

Mimic encryption system for network security

B Li, Q Zhou, X Si, J Fu - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet, increasingly more attention has been paid to
network security problems. A network security defense technology has become a very …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

[PDF][PDF] Image file security using base-64 algorithm

P Guwalani, M Kala, R Chandrashekar… - Pooja Guwalani Int …, 2014 - Citeseer
Abstract Information security is becoming a vital component of any data storage and
transmission operations. Since visual representation of data is gaining importance, data in …