Intelligent security algorithm for UNICODE data privacy and security in IOT
Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptog...
Gespeichert in:
| Veröffentlicht in: | Service oriented computing and applications Jg. 13; H. 1; S. 3 - 15 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
London
Springer London
14.03.2019
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 1863-2386, 1863-2394 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance. |
|---|---|
| AbstractList | Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance. |
| Author | Maram, Balajee Balaanand, M. Gnanasekar, J. M. Manogaran, Gunasekaran |
| Author_xml | – sequence: 1 givenname: Balajee orcidid: 0000-0002-9509-6943 surname: Maram fullname: Maram, Balajee email: balajee.m@gmrit.org organization: Department of CSE, GMR Institute of Technology – sequence: 2 givenname: J. M. surname: Gnanasekar fullname: Gnanasekar, J. M. organization: Department of Computer Science and Engineering, Sri Venkateswara College of Engineering – sequence: 3 givenname: Gunasekaran surname: Manogaran fullname: Manogaran, Gunasekaran organization: University of California – sequence: 4 givenname: M. surname: Balaanand fullname: Balaanand, M. organization: Department of CSE, V.R.S. College of Engineering and Technology |
| BookMark | eNp9kE9PAjEQxRuDiYh8AG-beF7tdP-0PRpE3EjkAuem2-3ikqWLbTHw7S1ZI4mJzmXm8H4zb941GpjOaIRuAd8DxvTBAdAcYgwsxiTl8eECDYHlSUwSng5-ZpZfobFzGxwqIZTldIheC-N12zZrbXzktNrbxh8j2a67MLxvo7qz0eqtmCyeplElvYx2tvmUKkhMddY3JioWyxt0WcvW6fF3H6HV83Q5eYnni1kxeZzHKoHcx5XSUmWScsoqXWU505DUFGclJWkiSUk40Krkqc4Y4JTrMlMMaFZzTSlAppMRuuv37mz3sdfOi023tyacFAT46Vmap0EFvUrZzjmraxGsb6U9CsDiFJvoYxMhNnGKTRwCQ38xqvHSN53xVjbtvyTpSReumLW2Z09_Q19174LG |
| CitedBy_id | crossref_primary_10_1002_cae_22220 crossref_primary_10_3233_JIFS_219123 crossref_primary_10_1007_s10776_021_00521_y crossref_primary_10_1007_s12553_019_00300_z crossref_primary_10_1080_09720529_2021_1968573 crossref_primary_10_1007_s10586_020_03114_1 crossref_primary_10_1155_2022_4247651 crossref_primary_10_1007_s11042_019_7243_y crossref_primary_10_3233_WOR_203421 crossref_primary_10_3233_WOR_203422 crossref_primary_10_3233_WOR_203424 crossref_primary_10_3233_WOR_203425 crossref_primary_10_3233_WOR_203426 crossref_primary_10_3233_WOR_203427 crossref_primary_10_1007_s00034_019_01197_9 crossref_primary_10_3846_transport_2020_13038 crossref_primary_10_1007_s11761_018_0251_3 crossref_primary_10_1142_S0219649222400238 crossref_primary_10_3233_JIFS_219032 crossref_primary_10_1002_dac_4274 crossref_primary_10_1007_s10772_021_09826_y crossref_primary_10_1007_s11042_018_7126_7 crossref_primary_10_1007_s12083_019_00797_1 crossref_primary_10_1007_s11042_019_7359_0 crossref_primary_10_1111_exsy_13206 crossref_primary_10_1007_s12553_018_00293_1 crossref_primary_10_1002_ett_4051 crossref_primary_10_1007_s11042_019_7585_5 crossref_primary_10_1016_j_comcom_2019_11_048 crossref_primary_10_1007_s12652_021_02921_7 crossref_primary_10_1007_s11042_019_08089_9 crossref_primary_10_1049_iet_its_2019_0833 crossref_primary_10_1007_s11042_019_07805_9 crossref_primary_10_1016_j_compeleceng_2021_107527 crossref_primary_10_2166_ws_2022_241 crossref_primary_10_1007_s11042_019_7421_y crossref_primary_10_1007_s11042_019_7487_6 crossref_primary_10_1007_s13369_021_05607_6 crossref_primary_10_3233_WOR_203417 crossref_primary_10_1007_s11042_019_07854_0 crossref_primary_10_1007_s11277_019_06590_w crossref_primary_10_3233_WOR_203418 crossref_primary_10_1007_s11276_023_03247_2 crossref_primary_10_1155_2022_2308825 crossref_primary_10_1007_s11761_020_00287_w crossref_primary_10_1007_s00500_021_05920_0 |
| Cites_doi | 10.1007/BF00203967 10.1109/ISACC.2015.7377325 10.15388/Informatica.2015.38 10.1109/WOCN.2012.6335543 10.1007/s00779-018-1132-7 10.1016/j.aej.2015.01.003 10.1109/ias.2008.12 10.17485/ijst/2015/v8i15/33437 10.1007/s10617-018-9203-6 10.1016/j.jss.2011.12.023 10.1007/s11042-018-6266-0 10.1109/itng.2010.105 10.1007/3-540-47789-6_108 10.15388/Informatica.2009.235 10.1016/j.future.2018.03.020 10.1109/ITNG.2006.120 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag London Ltd., part of Springer Nature 2018 Copyright Springer Nature B.V. 2019 |
| Copyright_xml | – notice: Springer-Verlag London Ltd., part of Springer Nature 2018 – notice: Copyright Springer Nature B.V. 2019 |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11761-018-0249-x |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1863-2394 |
| EndPage | 15 |
| ExternalDocumentID | 10_1007_s11761_018_0249_x |
| GroupedDBID | -59 -5G -BR -EM -~C .VR 06D 0R~ 123 203 2J2 2JN 2JY 2KG 2KM 2LR 2~H 30V 4.4 406 408 409 40E 5VS 67Z 6NX 875 8TC 8UJ 95- 95. 95~ AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBXA ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHYZX AIGIU AIIXL AILAN AITGF AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD AYJHY B-. BA0 BGNMA CS3 CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FNLPD FRRFC FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X J-C J0Z JBSCW JCJTX JZLTJ KDC KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O93 O9J OAM P2P P9O PF0 PT4 QOS R89 R9I ROL RPX RSV S16 S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 YLTOR Z45 Z7X Z83 Z88 ZMTXR ~A9 -Y2 2VQ AAPKM AARHV AAYXX ABBRH ABDBE ABFSG ABJCF ABRTQ ABULA ACBXY ACSTC AEBTG AEZWR AFDZB AFFHD AFGCZ AFHIU AFKRA AFOHR AHPBZ AHSBF AHWEU AIAKS AIXLP AJBLW ARAPS ATHPR AYFIA BDATZ BENPR BGLVJ CAG CCPQU CITATION COF FINBP FSGXE H13 HCIFZ HZ~ K7- M7S O9- PHGZM PHGZT PQGLB PTHSS S1Z JQ2 |
| ID | FETCH-LOGICAL-c316t-dceac5a7978ded568e13f705b7243a2b2917db94e581049eb5c8175f9e77115e3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 59 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000461352200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1863-2386 |
| IngestDate | Thu Sep 25 00:53:00 EDT 2025 Sat Nov 29 01:50:26 EST 2025 Tue Nov 18 21:02:34 EST 2025 Fri Feb 21 02:28:45 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Hamming distance Balanced output UNICODE S-box Avalanche effect |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c316t-dceac5a7978ded568e13f705b7243a2b2917db94e581049eb5c8175f9e77115e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-9509-6943 |
| PQID | 2191863764 |
| PQPubID | 2044172 |
| PageCount | 13 |
| ParticipantIDs | proquest_journals_2191863764 crossref_primary_10_1007_s11761_018_0249_x crossref_citationtrail_10_1007_s11761_018_0249_x springer_journals_10_1007_s11761_018_0249_x |
| PublicationCentury | 2000 |
| PublicationDate | 20190314 |
| PublicationDateYYYYMMDD | 2019-03-14 |
| PublicationDate_xml | – month: 3 year: 2019 text: 20190314 day: 14 |
| PublicationDecade | 2010 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London – name: Heidelberg |
| PublicationTitle | Service oriented computing and applications |
| PublicationTitleAbbrev | SOCA |
| PublicationYear | 2019 |
| Publisher | Springer London Springer Nature B.V |
| Publisher_xml | – name: Springer London – name: Springer Nature B.V |
| References | Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085 AhmedNTesting an S-box for cryptographic useInt J Comput Electr Eng2015815 KazlauskasKVaicekauskasGSmaliukasRAn algorithm for key-dependent S-box generation in block cipher systemInformatica2015261516510.15388/Informatica.2015.38 PorLYWongKCheeKOUniSpaCh: a text-based data hiding method using Unicode space charactersJ Syst Softw2012851075108210.1016/j.jss.2011.12.023 Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011) PfleegerCPPfleegerSLSecurity in computing2004LondonPearson Education6426660278.94030 Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153 Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515 HussainIShahTMahmoodHAfzalMComparative analysis of S-boxes based on graphical SACInt J Comput Appl20102517 Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version) Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE. https://doi.org/10.1109/itng.2010.105 Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952 Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16 KazlauskasKKazlauskasJKey-dependent S-box generation in AES block cipher systemInformatica2009201233413582391178.68227 StallingsWNetwork security essentials (applications and standards)2004LondonPearson Education280 Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343 Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22 Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6 Shirali-ShahrezaHShirali-ShahrezaMSteganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection charactersJ Theor Appl Inf Technol200848682687 Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562 Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397 MroczkowskiPGenerating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphersJ Telecommun Inf Technol200927479 Hussain AlkhaldiAA novel design for the construction of safe S-boxes based on TDERC sequenceAlexandria Eng J2015 TandonASharmaRSodhiyaSDurai Raj VincentPMUniversal encryption algorithm using logical operations and bits shuffling for unicodeIndian J Sci Technol2015 AldabbaghSSMAl ShaikhliIFTZabaMRKey-dependent S-box in lightweight block ciphersJ Theor Appl Inf Technol2014622554 Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst AdamsCTavaresSThe structured design of cryptographically good S-boxesJ Cryptol1990312741108697510.1007/BF002039670711.94016 Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE. https://doi.org/10.1109/ias.2008.12 Abdel-BassetMEl-ShahatDMirjaliliSA hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problemFuture Gener Comput Syst20188512914510.1016/j.future.2018.03.020 Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630 Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11 Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602 Abdel-BassetMManogaranGFakhryAEEl-HenawyI2-Levels of clustering strategy to detect and locate copy-move forgery in digital imagesMultimed Tools Appl2018 Balajee MaramKGnanasekarJMUNICODE text security using dynamic and key-dependent 16X16 S-BoxAustr J Basic Appl Sci20161012636 Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646 Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE RamanujamSKaruppiahMDesigning an algorithm with high avalanche effectIJCSNS Int J Comput Sci Netw Secur2011111106 Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24 Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616 W Stallings (249_CR1) 2004 249_CR39 249_CR16 LY Por (249_CR12) 2012; 85 249_CR19 249_CR18 A Tandon (249_CR34) 2015 P Mroczkowski (249_CR9) 2009; 2 249_CR37 249_CR31 H Shirali-Shahreza (249_CR11) 2008; 4 249_CR30 249_CR33 249_CR10 SSM Aldabbagh (249_CR15) 2014; 62 249_CR32 M Abdel-Basset (249_CR36) 2018; 85 S Ramanujam (249_CR21) 2011; 11 C Adams (249_CR6) 1990; 3 249_CR5 249_CR4 I Hussain (249_CR7) 2010; 2 249_CR3 N Ahmed (249_CR8) 2015; 8 M Abdel-Basset (249_CR38) 2018 249_CR28 249_CR27 CP Pfleeger (249_CR2) 2004 249_CR29 249_CR24 K Kazlauskas (249_CR14) 2009; 20 249_CR23 249_CR45 249_CR26 249_CR25 249_CR20 249_CR42 249_CR41 249_CR22 249_CR44 249_CR43 K Kazlauskas (249_CR13) 2015; 26 249_CR40 A Hussain Alkhaldi (249_CR17) 2015 K Balajee Maram (249_CR35) 2016; 10 |
| References_xml | – reference: Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153 – reference: Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562 – reference: Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11 – reference: Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646 – reference: HussainIShahTMahmoodHAfzalMComparative analysis of S-boxes based on graphical SACInt J Comput Appl20102517 – reference: PfleegerCPPfleegerSLSecurity in computing2004LondonPearson Education6426660278.94030 – reference: Hussain AlkhaldiAA novel design for the construction of safe S-boxes based on TDERC sequenceAlexandria Eng J2015 – reference: Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630 – reference: MroczkowskiPGenerating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphersJ Telecommun Inf Technol200927479 – reference: Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE – reference: Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application – reference: Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst – reference: Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602 – reference: Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22 – reference: Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397 – reference: PorLYWongKCheeKOUniSpaCh: a text-based data hiding method using Unicode space charactersJ Syst Softw2012851075108210.1016/j.jss.2011.12.023 – reference: Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6 – reference: Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085 – reference: Abdel-BassetMEl-ShahatDMirjaliliSA hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problemFuture Gener Comput Syst20188512914510.1016/j.future.2018.03.020 – reference: Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515 – reference: AdamsCTavaresSThe structured design of cryptographically good S-boxesJ Cryptol1990312741108697510.1007/BF002039670711.94016 – reference: Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE. https://doi.org/10.1109/itng.2010.105 – reference: Balajee MaramKGnanasekarJMUNICODE text security using dynamic and key-dependent 16X16 S-BoxAustr J Basic Appl Sci20161012636 – reference: KazlauskasKKazlauskasJKey-dependent S-box generation in AES block cipher systemInformatica2009201233413582391178.68227 – reference: RamanujamSKaruppiahMDesigning an algorithm with high avalanche effectIJCSNS Int J Comput Sci Netw Secur2011111106 – reference: TandonASharmaRSodhiyaSDurai Raj VincentPMUniversal encryption algorithm using logical operations and bits shuffling for unicodeIndian J Sci Technol2015 – reference: Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE – reference: Shirali-ShahrezaHShirali-ShahrezaMSteganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection charactersJ Theor Appl Inf Technol200848682687 – reference: Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616 – reference: Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952 – reference: Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE – reference: Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16 – reference: StallingsWNetwork security essentials (applications and standards)2004LondonPearson Education280 – reference: Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24 – reference: Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation – reference: Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version) – reference: Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343 – reference: Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society – reference: Abdel-BassetMManogaranGFakhryAEEl-HenawyI2-Levels of clustering strategy to detect and locate copy-move forgery in digital imagesMultimed Tools Appl2018 – reference: Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst – reference: Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE. https://doi.org/10.1109/ias.2008.12 – reference: AhmedNTesting an S-box for cryptographic useInt J Comput Electr Eng2015815 – reference: KazlauskasKVaicekauskasGSmaliukasRAn algorithm for key-dependent S-box generation in block cipher systemInformatica2015261516510.15388/Informatica.2015.38 – reference: Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011) – reference: AldabbaghSSMAl ShaikhliIFTZabaMRKey-dependent S-box in lightweight block ciphersJ Theor Appl Inf Technol2014622554 – volume: 62 start-page: 554 issue: 2 year: 2014 ident: 249_CR15 publication-title: J Theor Appl Inf Technol – volume: 3 start-page: 27 issue: 1 year: 1990 ident: 249_CR6 publication-title: J Cryptol doi: 10.1007/BF00203967 – ident: 249_CR27 – ident: 249_CR19 – ident: 249_CR23 – ident: 249_CR44 – ident: 249_CR25 – ident: 249_CR32 doi: 10.1109/ISACC.2015.7377325 – volume: 26 start-page: 51 issue: 1 year: 2015 ident: 249_CR13 publication-title: Informatica doi: 10.15388/Informatica.2015.38 – volume: 10 start-page: 26 issue: 1 year: 2016 ident: 249_CR35 publication-title: Austr J Basic Appl Sci – ident: 249_CR45 doi: 10.1109/WOCN.2012.6335543 – start-page: 642 volume-title: Security in computing year: 2004 ident: 249_CR2 – volume: 8 start-page: 1 year: 2015 ident: 249_CR8 publication-title: Int J Comput Electr Eng – ident: 249_CR37 doi: 10.1007/s00779-018-1132-7 – ident: 249_CR40 – year: 2015 ident: 249_CR17 publication-title: Alexandria Eng J doi: 10.1016/j.aej.2015.01.003 – ident: 249_CR42 – ident: 249_CR31 doi: 10.1109/ias.2008.12 – ident: 249_CR29 – ident: 249_CR30 – year: 2015 ident: 249_CR34 publication-title: Indian J Sci Technol doi: 10.17485/ijst/2015/v8i15/33437 – ident: 249_CR39 doi: 10.1007/s10617-018-9203-6 – volume: 4 start-page: 682 issue: 8 year: 2008 ident: 249_CR11 publication-title: J Theor Appl Inf Technol – ident: 249_CR24 – volume: 85 start-page: 1075 year: 2012 ident: 249_CR12 publication-title: J Syst Softw doi: 10.1016/j.jss.2011.12.023 – year: 2018 ident: 249_CR38 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-6266-0 – ident: 249_CR22 – ident: 249_CR33 doi: 10.1109/itng.2010.105 – ident: 249_CR4 doi: 10.1007/3-540-47789-6_108 – volume: 20 start-page: 23 issue: 1 year: 2009 ident: 249_CR14 publication-title: Informatica doi: 10.15388/Informatica.2009.235 – ident: 249_CR28 – ident: 249_CR18 – ident: 249_CR26 – ident: 249_CR43 – ident: 249_CR20 – volume: 85 start-page: 129 year: 2018 ident: 249_CR36 publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2018.03.020 – start-page: 2 volume-title: Network security essentials (applications and standards) year: 2004 ident: 249_CR1 – volume: 2 start-page: 74 year: 2009 ident: 249_CR9 publication-title: J Telecommun Inf Technol – ident: 249_CR5 – volume: 2 start-page: 1 issue: 5 year: 2010 ident: 249_CR7 publication-title: Int J Comput Appl – ident: 249_CR10 – volume: 11 start-page: 106 issue: 1 year: 2011 ident: 249_CR21 publication-title: IJCSNS Int J Comput Sci Netw Secur – ident: 249_CR16 – ident: 249_CR41 – ident: 249_CR3 doi: 10.1109/ITNG.2006.120 |
| SSID | ssj0000327867 |
| Score | 2.3762946 |
| Snippet | Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3 |
| SubjectTerms | Algorithms Audio data Computer Appl. in Administrative Data Processing Computer Science Computer Systems Organization and Communication Networks Cryptography Cybersecurity Digital data e-Commerce/e-business Image transmission IT in Business Management of Computing and Information Systems Programming languages Scientific papers Software Engineering/Programming and Operating Systems Software reviews Special Issue Paper Text editing Video transmission |
| Title | Intelligent security algorithm for UNICODE data privacy and security in IOT |
| URI | https://link.springer.com/article/10.1007/s11761-018-0249-x https://www.proquest.com/docview/2191863764 |
| Volume | 13 |
| WOSCitedRecordID | wos000461352200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1863-2394 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000327867 issn: 1863-2386 databaseCode: RSV dateStart: 20070401 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA-iPvji_MTplDz4pASapm3SR5kbDmUTnbK30nxUB7OTtQ7_fC9du6KooG-FXo9wl9z9fk1yh9ApjY3UiWREUc6I58mEAIiVRDKYIEy4kidFndkb3u-L0Si8Le9xZ9Vp92pLsojU9WU3CpQbqK8gtswdAeC4BtlO2NV4d_-4_LHiMJeLonMsFQEjkJKCajfzOy2f81ENMr_sixbpptv410C30GaJLvHFYjpsoxWT7qBG1bkBlwt5F133lpU4c5yVLexwPHmawsPzCwYki4EZtgeXHWzPkGIYwTxWIJLqWn6c4t5guIceup1h-4qUbRWIYjTIiVYQbP2YA3_URvuBMJQl3PEldz0Wu9IFBqdl6BlfAFcLjfSVAJCRhIZzwI-G7aPVdJqaA4R9YbjjUQ2KladVIA23hMgEJpahdHkTOZVxI1XWHLetLyZRXS3ZGisCY0XWWNF7E50tP3ldFNz4TbhVeSwq114WQQy2nueB10TnlYfq1z8qO_yT9BHaAOwU2uNo1Guh1Xz2Zo7Ruprn42x2UkzJDxwQ2sE |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA6igr44f-J0ah58UgJrkzbpo8yNjc1NdMreSpOmOpidrHX453vp2hVFBX0r9HqES3L3fc3lDqFzK9AyjCQlyuKUMCYjAiBWEklhgVBhSx5ldWZ7vN8Xo5F3m9_jTops9-JIMvPU5WU3Cyg3UF9BTJk7AsBxjUHAMnl8d_ePyx8rdWpzkXWOtYRLCYQktzjN_E7L53hUgswv56JZuGlV_jXQbbSVo0t8tVgOO2hFx7uoUnRuwPlG3kPdzrISZ4qTvIUdDiZPU3h4fsGAZDEww8bguolNDimGEcwDBSJxWMqPY9wZDPfRQ6s5bLRJ3laBKGq5KQkVOFsn4MAfQx06rtAWjXjdkdxmNLClDQwulB7TjgCu5mnpKAEgI_I054AfNT1Aq_E01ocIO0LzOrNCUKxYqFypuSFE2tWB9KTNq6heGNdXec1x0_pi4pfVko2xfDCWb4zlv1fRxfKT10XBjd-Ea8WM-fneS3zwwWbmucuq6LKYofL1j8qO_iR9hjbaw5ue3-v0u8doE3CUZ1LTLFZDq-nsTZ-gdTVPx8nsNFueH2XF3aU |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFA6iIr44rzidmgeflODapE36KLvg2JiCU3wrzaU6mN3Y6vDne9K1K4oK4luhpyGcnCTf15N8B6FzJzJSx5IS5XBKGJMxARAriaQQIFS4kseZzmyP9_vi6Sm4y-uczorT7kVKcnGnwao0JenVRMdX5cU3B-g30GBBrOQdARC5xmzNIEvX7x-XP1nq1OUiqyLrCJ8S2J78IrP5XSuf96YScH7JkWZbT7vy705vo60cdeLrRZjsoBWT7KJKUdEB5xN8D3U7S4XOFM_y0nY4Gj2P4eHlFQPCxcAYG7fNFrZnSzH0Zh4pMEl0aT9McOd2sI8e2q1B44bk5RaIoo6fEq1gEfYiDrxSG-35wjg05nVPcpfRyJUuMDstA2Y8ARwuMNJTAsBHHBjOAVcaeoBWk3FiDhH2hOF15mhoWDGtfGm4JUrGN5EMpMurqF44OlS5FrktiTEKSxVl66wQnBVaZ4XvVXSx_GSyEOL4zbhWjF6Yz8lZCGuzjQLusyq6LEarfP1jY0d_sj5DG3fNdtjr9LvHaBPgVWBPrDmshlbT6Zs5Qetqng5n09MsUj8Ah-rmiQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intelligent+security+algorithm+for+UNICODE+data+privacy+and+security+in+IOT&rft.jtitle=Service+oriented+computing+and+applications&rft.au=Balajee+Maram&rft.au=Gnanasekar%2C+J+M&rft.au=Gunasekaran+Manogaran&rft.au=Balaanand%2C+M&rft.date=2019-03-14&rft.pub=Springer+Nature+B.V&rft.issn=1863-2386&rft.eissn=1863-2394&rft.volume=13&rft.issue=1&rft.spage=3&rft.epage=15&rft_id=info:doi/10.1007%2Fs11761-018-0249-x&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1863-2386&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1863-2386&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1863-2386&client=summon |