A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication

Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been propo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers (Basel) Jg. 11; H. 3; S. 39
Hauptverfasser: Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Basel MDPI AG 01.03.2022
Schlagworte:
ISSN:2073-431X, 2073-431X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted.
AbstractList Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted.
Author Chahl, Javaan
Noor, Noor Sattar
Hammood, Dalal Abdulmohsin
Al-Naji, Ali
Author_xml – sequence: 1
  givenname: Noor Sattar
  surname: Noor
  fullname: Noor, Noor Sattar
– sequence: 2
  givenname: Dalal Abdulmohsin
  surname: Hammood
  fullname: Hammood, Dalal Abdulmohsin
– sequence: 3
  givenname: Ali
  orcidid: 0000-0002-8840-9235
  surname: Al-Naji
  fullname: Al-Naji, Ali
– sequence: 4
  givenname: Javaan
  orcidid: 0000-0001-6496-0543
  surname: Chahl
  fullname: Chahl, Javaan
BookMark eNp9UU1LAzEQDaJg1f4AbwueV5OdJJs9lvpVED3YgreQZid1a3dTs1nUf-_WqoiCc5nH8N6bYd4B2W18g4QcM3oKUNAz6-t1FzG0jFGgFIodMshoDikH9rD7A--TYdsuaV8FA5WxAZmNkkvTxmSKrzGNPp3UZoHJRWPD2zpWvknP8Qsmo9XChyo-1onzIblH2wVMbjG--PCUjH1dd01lzYZ6RPacWbU4_OyHZHZ5MR1fpzd3V5Px6Ca1_faYAiDwObfgMltKlOCQSyYkp6WyrJ8V4ITM5oCINLfSCGEUdyjnHAEsh0My2fqW3iz1OlS1CW_am0p_DHxYaBNiZVeoS1WUKJVyylJe5qCYEByMUMzmOQjRe51svdbBP3fYRr30XWj683Umebah5EXPYluWDb5tA7rvrYzqTRj6Txi9Jv-lsVX8-FMMplr9o3wHkoGTlw
CitedBy_id crossref_primary_10_1016_j_chaos_2024_115001
crossref_primary_10_1007_s11277_022_09901_w
crossref_primary_10_1080_03772063_2025_2505105
crossref_primary_10_1371_journal_pone_0290831
crossref_primary_10_3390_inventions8040102
crossref_primary_10_1007_s11042_024_19093_z
crossref_primary_10_2298_TSCI2406205B
crossref_primary_10_1049_tje2_70124
crossref_primary_10_3390_computers12080160
Cites_doi 10.1016/j.eswa.2021.114978
10.1007/978-981-16-5655-2_13
10.1109/ACCESS.2021.3060947
10.1002/cpe.6649
10.1016/j.optlaseng.2020.106485
10.4018/978-1-7998-6988-7.ch008
10.1007/978-981-13-0277-0
10.3390/e23121648
10.14569/IJACSA.2012.031106
10.1016/j.procs.2020.03.198
10.1109/ICIDM51048.2020.9339674
10.1109/ICECA49313.2020.9297478
10.3390/s20010083
10.1016/j.procs.2016.02.108
10.1016/j.optlaseng.2019.105821
10.1016/j.chaos.2020.110344
10.1007/s11831-020-09425-1
10.1007/s40747-020-00162-3
10.1080/03081079.2021.1919102
10.1063/1.5142095
10.1109/CyberSec.2012.6246080
10.1016/j.chaos.2020.110582
10.1007/s00521-019-04637-4
10.1007/s11071-021-06576-z
10.1007/s11042-020-09469-2
10.1080/09720529.2019.1569821
10.1109/ACCESS.2021.3081024
10.1007/s00521-017-2970-3
10.1007/s11045-018-0589-x
10.1109/SPIN.2018.8474240
10.1007/s11554-020-01008-4
10.1109/ICOIN50884.2021.9333881
10.1007/978-3-030-75945-2_14
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.3390/computers11030039
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList
CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2073-431X
ExternalDocumentID oai_doaj_org_article_d89de688f8c04d73815543a581c77355
10_3390_computers11030039
GroupedDBID 5VS
8FE
8FG
AADQD
AAYXX
ABUWG
ADBBV
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
IVC
K6V
K7-
KQ8
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
3V.
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c382t-33e34b4c3f2cd6e63fe4615640d8c12cd93f562b3eee07c6a55a84fe6b4e33c43
IEDL.DBID P5Z
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000775687000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2073-431X
IngestDate Mon Nov 10 04:34:59 EST 2025
Fri Jul 25 07:25:40 EDT 2025
Tue Nov 18 22:22:58 EST 2025
Sat Nov 29 07:17:15 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-33e34b4c3f2cd6e63fe4615640d8c12cd93f562b3eee07c6a55a84fe6b4e33c43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8840-9235
0000-0001-6496-0543
OpenAccessLink https://www.proquest.com/docview/2642355379?pq-origsite=%requestingapplication%
PQID 2642355379
PQPubID 2032413
ParticipantIDs doaj_primary_oai_doaj_org_article_d89de688f8c04d73815543a581c77355
proquest_journals_2642355379
crossref_primary_10_3390_computers11030039
crossref_citationtrail_10_3390_computers11030039
PublicationCentury 2000
PublicationDate 2022-03-01
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: 2022-03-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Computers (Basel)
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Wang (ref_37) 2020; 143
Singh (ref_3) 2015; 2
ref_14
Khan (ref_27) 2019; 30
ref_12
ref_33
Naji (ref_4) 2020; 2203
Arun (ref_16) 2015; 1
Lakshmi (ref_32) 2019; 32
Shah (ref_36) 2020; 17
Dhal (ref_23) 2020; 28
Singh (ref_2) 2014; 2
Daoui (ref_22) 2021; 177
ref_19
ref_18
(ref_41) 2017; 14
(ref_13) 2016; 30
Luo (ref_24) 2021; 9
Abusukhon (ref_15) 2019; 22
Li (ref_25) 2021; 9
Wahsheh (ref_44) 2021; 2021
Alaya (ref_8) 2021; 58
Tutueva (ref_31) 2020; 141
Ibada (ref_10) 2021; 1962
Huang (ref_30) 2020; 124
Sumathi (ref_38) 2020; 7
Degadwala (ref_34) 2020; 167
Patil (ref_11) 2016; 78
ref_21
ref_42
ref_40
ref_1
Midoun (ref_39) 2020; 139
Ahmad (ref_28) 2018; 30
ref_29
Bououden (ref_20) 2021; 50
Abusukhon (ref_43) 2021; 34
Naji (ref_9) 2019; 18
ref_26
Liu (ref_35) 2021; 104
Abusukhon (ref_17) 2016; 2225
Abusukhon (ref_5) 2013; 4
ref_7
ref_6
Fu (ref_45) 2020; 79
References_xml – volume: 177
  start-page: 114978
  year: 2021
  ident: ref_22
  article-title: New robust method for image copyright protection using histogram features and Sine Cosine Algorithm
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2021.114978
– ident: ref_7
  doi: 10.1007/978-981-16-5655-2_13
– volume: 9
  start-page: 31792
  year: 2021
  ident: ref_24
  article-title: Underwater Image Restoration and Enhancement Based on a Fusion Algorithm with Color Balance, Contrast Optimization, and Histogram Stretching
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3060947
– volume: 34
  start-page: e6649
  year: 2021
  ident: ref_43
  article-title: An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm
  publication-title: Concurr. Comput. Pr. Exp.
  doi: 10.1002/cpe.6649
– volume: 139
  start-page: 106485
  year: 2020
  ident: ref_39
  article-title: A sensitive dynamic mutual encryption system based on a new 1D chaotic map
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106485
– volume: 4
  start-page: 50
  year: 2013
  ident: ref_5
  article-title: Block cipher encryption for Text-to-Image Encryption algorithm
  publication-title: Int. J. Comput. Eng. Technol. (IJCET)
– ident: ref_6
  doi: 10.4018/978-1-7998-6988-7.ch008
– volume: 1
  start-page: 37
  year: 2015
  ident: ref_16
  article-title: AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic
  publication-title: Int. J. Recent Res. Sci. Eng. Technol.
– ident: ref_21
  doi: 10.1007/978-981-13-0277-0
– volume: 2021
  start-page: 5540670
  year: 2021
  ident: ref_44
  article-title: Secure Real-Time Artificial Intelligence System against Malicious QR Code Links
  publication-title: Secur. Commun. Networks
– volume: 2
  start-page: 1
  year: 2015
  ident: ref_3
  article-title: Combination of RGB Substitution for Text to Image Encryption Technique using AES
  publication-title: Spvryans Int. J. Eng. Sci. Technol.
– volume: 14
  start-page: 851
  year: 2017
  ident: ref_41
  article-title: A New Implementation of Text-To-Image Encryption Using Multilevel Substitution and Transposition
  publication-title: Int. J. Comput. Sci. Inf. Secur.
– ident: ref_26
  doi: 10.3390/e23121648
– volume: 2225
  start-page: 410
  year: 2016
  ident: ref_17
  article-title: A novel network security algorithm based on encrypting text into a White-Page Image
  publication-title: Lect. Notes Eng. Comput. Sci.
– ident: ref_42
  doi: 10.14569/IJACSA.2012.031106
– ident: ref_18
– volume: 167
  start-page: 213
  year: 2020
  ident: ref_34
  article-title: Novel Image Watermarking Approach against Noise and RST Attacks
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2020.03.198
– volume: 1962
  start-page: 012061
  year: 2021
  ident: ref_10
  article-title: RGB Image Encryption using Hill Algorithm and Chaos System
  publication-title: J. Physics: Conf. Ser.
– ident: ref_1
  doi: 10.1109/ICIDM51048.2020.9339674
– volume: 30
  start-page: 128
  year: 2016
  ident: ref_13
  article-title: It doesn’t speak to me’: Understanding student of color resistance to critical race pedagogy
  publication-title: Int. J. Qual. Stud. Educ.
– ident: ref_19
  doi: 10.1109/ICECA49313.2020.9297478
– ident: ref_29
  doi: 10.3390/s20010083
– volume: 18
  start-page: 24
  year: 2019
  ident: ref_9
  article-title: Implantation of Caesar and Hill Cipher on Database for Better Security
  publication-title: Eur. J. Technol. Eng.
– volume: 78
  start-page: 617
  year: 2016
  ident: ref_11
  article-title: A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2016.02.108
– volume: 124
  start-page: 105821
  year: 2020
  ident: ref_30
  article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.105821
– volume: 141
  start-page: 110344
  year: 2020
  ident: ref_31
  article-title: Construction of one-way hash functions with increased key space using adaptive chaotic maps
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2020.110344
– volume: 28
  start-page: 1471
  year: 2020
  ident: ref_23
  article-title: Histogram Equalization Variants as Optimization Problems: A Review
  publication-title: Arch. Comput. Methods Eng.
  doi: 10.1007/s11831-020-09425-1
– volume: 7
  start-page: 1733
  year: 2020
  ident: ref_38
  article-title: A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography
  publication-title: Complex Intell. Syst.
  doi: 10.1007/s40747-020-00162-3
– volume: 50
  start-page: 501
  year: 2021
  ident: ref_20
  article-title: A novel fractional piecewise linear map: Regular and chaotic dynamics
  publication-title: Int. J. Gen. Syst.
  doi: 10.1080/03081079.2021.1919102
– volume: 58
  start-page: 102779
  year: 2021
  ident: ref_8
  article-title: Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks
  publication-title: J. Inf. Secur. Appl.
– volume: 2203
  start-page: 020003
  year: 2020
  ident: ref_4
  article-title: Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography
  publication-title: AIP Conf. Proc.
  doi: 10.1063/1.5142095
– ident: ref_14
  doi: 10.1109/CyberSec.2012.6246080
– volume: 143
  start-page: 110582
  year: 2020
  ident: ref_37
  article-title: High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2020.110582
– volume: 32
  start-page: 11477
  year: 2019
  ident: ref_32
  article-title: Hopfield attractor-trusted neural network: An attack-resistant image encryption
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-019-04637-4
– volume: 104
  start-page: 4615
  year: 2021
  ident: ref_35
  article-title: A chaotic image encryption algorithm based on coupled piecewise sine map and sensitive diffusion structure
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-021-06576-z
– volume: 79
  start-page: 32471
  year: 2020
  ident: ref_45
  article-title: Distributed color QR code with high-capability and fast decoding
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-020-09469-2
– volume: 22
  start-page: 65
  year: 2019
  ident: ref_15
  article-title: A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
  publication-title: J. Discret. Math. Sci. Cryptogr.
  doi: 10.1080/09720529.2019.1569821
– volume: 9
  start-page: 73012
  year: 2021
  ident: ref_25
  article-title: Complexity Analysis of Three-Dimensional Fractional-Order Chaotic System Based on Entropy Theory
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3081024
– volume: 30
  start-page: 3847
  year: 2018
  ident: ref_28
  article-title: A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-017-2970-3
– volume: 30
  start-page: 943
  year: 2019
  ident: ref_27
  article-title: Chaos based efficient selective image encryption
  publication-title: Multidimens. Syst. Signal Process.
  doi: 10.1007/s11045-018-0589-x
– ident: ref_33
  doi: 10.1109/SPIN.2018.8474240
– volume: 2
  start-page: 58
  year: 2014
  ident: ref_2
  article-title: Data security using private key encryption system based on arithmetic coding
  publication-title: Int. J. Netw. Secur. Its Appl.
– volume: 17
  start-page: 139
  year: 2020
  ident: ref_36
  article-title: Efficient image encryption scheme based on generalized logistic map for real time image processing
  publication-title: J. Real-Time Image Process.
  doi: 10.1007/s11554-020-01008-4
– ident: ref_40
  doi: 10.1109/ICOIN50884.2021.9333881
– ident: ref_12
  doi: 10.1007/978-3-030-75945-2_14
SSID ssj0000913821
Score 2.3319218
Snippet Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 39
SubjectTerms Algorithms
capacity
Cell division
Communication
compression
Cryptography
Data encryption
Data recovery
decryption
Encryption
Network security
Receivers & amplifiers
Security
TTIED-CMYK mode
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA8yPHjxW5xOycGTUNYmWZMe58dQkOFhk91Km7zoYB-yVsH_3pe0G5OBXryVNCXpy8v7aF9-P0KuLGOAWYAKTJbngWCYs2agRSCkEVFopLC-ePzlSfb7ajRKnteovlxNWAUPXAmubVRiIFbKKh0KI9HBoAPkWUdFWkp0ls76hjJZS6a8DU4ctl5U_cbkmNe3dU2SUESOWCt05OBrjsjj9W-YY-9jevtktw4Oabea1AHZgtkh2VsSL9B6Hx6RYZf2sqKkA5e2lvPgcYpWgd7P9OLLW4DgDpaXtDt5nS_G5duUYnhK_ed1oP2q-Jv-OB5yTIa9-8HtQ1DzIwQaX64MOAcucqG5ZdrEEHMLInbgL6FROsK2hFsMb3IOAKHUcdbpZEpYiHMBnGvBT0hjNp_BKaFcMt0BaUKWg8gsWmNIRK4MRju5MMw2SbgUVqpr8HDHYTFJMYlw8k035Nsk16tH3ivkjN8637gVWHV0oNe-AVUhrVUh_UsVmqS1XL-03olFigEfw3tcJmf_McY52WHuAISvQmuRRrn4gAuyrT_LcbG49Er4DYQE4oo
  priority: 102
  providerName: Directory of Open Access Journals
Title A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
URI https://www.proquest.com/docview/2642355379
https://doaj.org/article/d89de688f8c04d73815543a581c77355
Volume 11
WOSCitedRecordID wos000775687000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: DOA
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: M~E
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: P5Z
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: K7-
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: BENPR
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: PIMPY
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFLc22GGXwb5EN6h82GmSRWI7sXOaymg1BFTRBBPbJUrsZ0CCljUBaf_9nl2nbELiwiWKYkeJ_Oz35effj5BPjnPAKEAzWzcNkxxj1hqMZFJZmSZWSReKx38cqelUn50VZUy4tbGssteJQVHbufE58l003Bxto1DFl5vfzLNG-d3VSKHxnKx7lARP3VBmv1Y5Fo95qXm63MwUGN3vmkiV0KaeXivxFOH_mKOA2v9AKQdLM9l46j9uklfRx6Sj5aR4TZ7B7A3Z6PkbaFzOb8npiE7qtqMnPvrt5uzgGpULHc_M4k9QJGwf-ls6ujrHL3UX1xS9XBqy9ECnyxpy-t8pk3fkdDI--fqNRZoFZnB0OiYECNlIIxw3NodcOJC5x5BJrDYpPiuEQy-pEQCQKJPXWVZr6SBvJAhhpHhP1mbzGWwRKhQ3GSib8AZk7VCpQyEbbdFpaqTlbkCSfrQrEzHIPRXGVYWxiBdQ9UBAA_J59crNEoDjsc57XoSrjh47OzyYL86ruBQrqwsLudZOm0RahS4LulSiznRqlELxDch2L90qLui2uhfth8ebP5KX3J-QCGVq22StW9zCDnlh7rrLdjEk63vjafl9GEJ_vB4qNgxzFlvKg-Py519_EPb7
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VgkQvlK-qCwV8gAuS1cT2xs4BVVvaVVe7rDhsUW8hscdtpXa3bAKof4rfyDgfC6hSbz1wixwnUuLnNzP2eB7AWy8EUhRguMuLgitBMWuOVnGlnYojp5Wvk8e_TPR0ak5O0s9r8Ks7CxPSKjtOrInaLWxYI98lwy3INkqd7l1940E1KuyudhIaDSzGeP2TQrbyw-iAxvedEMPD2ccj3qoKcCuNqLiUKFWhrPTCugQT6VEloWRK5IyNqS2VnpyCQiJipG2S9_u5UR6TQqGUVkl67z24r6TRYV6NNV-t6YQam0bEzeaplGm0a1tphjIOcl5RkCT_y_zVKgE3jEBt2Yab_9s_eQyPWh-aDRrQP4E1nD-FzU6fgrV09QyOB2yYlxWbhei-WvDRJZEnO5zb5XVNlPwAu0s2uDilL6vOLhl58azehUA2bXLk2T-naJ7D8Z183Baszxdz3AYmtbB91C4SBarck9HCVBXGkVNYKCd8D6JudDPb1lgPUh8XGcVaARDZDUD04P3qkaumwMhtnfcDZFYdQ23wumGxPM1aqsmcSR0mxnhjI-U0uWTkMsq8b2KrNcGlBzsdmrKWsMrsD5Re3H77DTw8mn2aZJPRdPwSNkQ4DVKn5O3AerX8jq_ggf1RnZfL1_XcYPD1roH3G15oT18
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VglAvlK-qCwV8gAtStIntxM4BoYXtilWr1R5aVHEJiT0uSO1u2QRQ_xq_jrGTLKBKvfXALXKcSImf38zY43kALx3nSFGAjmxZVZHkFLOWaGQklZVJbJV0IXn846GazfTJST7fgF_9WRifVtlzYiBquzR-jXxIhpuTbRQqH7ouLWI-nry9-BZ5BSm_09rLabQQOcDLnxS-1W-mYxrrV5xP9o_ef4g6hYHICM2bSAgUspJGOG5shplwKDNfPiW22iTUlgtHDkIlEDFWJivTtNTSYVZJFMJIQe-9BbcVxZg-nXCeflqv7_h6m5on7UaqEHk8NJ1MQ514aa_Yy5P_ZQqDYsAVgxCs3GT7f_4_9-Fe51uzUTsZHsAGLh7Cdq9bwToaewTHIzYp64Yd-ai_WUbTcyJVtr8wq8tAoNEY-0s2OjulL2u-nDPy7lnYnUA2a3Pn2T-nax7D8Y183A5sLpYL3AUmFDcpKhvzCmXpyJhhLittyVmspOVuAHE_0oXpaq97CZCzgmIwD47iCjgG8Hr9yEVbeOS6zu88fNYdfc3w0LBcnRYdBRVW5xYzrZ02sbSKXDVyJUWZ6sQoRdAZwF6PrKIjsrr4A6sn199-AXcJb8XhdHbwFLa4PyQSMvX2YLNZfcdncMf8aL7Wq-dhmjD4fNO4-w2JWliD
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Fast+Text-to-Image+Encryption-Decryption+Algorithm+for+Secure+Network+Communication&rft.jtitle=Computers+%28Basel%29&rft.au=Noor+Sattar+Noor&rft.au=Dalal+Abdulmohsin+Hammood&rft.au=Al-Naji%2C+Ali&rft.au=Chahl%2C+Javaan&rft.date=2022-03-01&rft.pub=MDPI+AG&rft.eissn=2073-431X&rft.volume=11&rft.issue=3&rft.spage=39&rft_id=info:doi/10.3390%2Fcomputers11030039&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-431X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-431X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-431X&client=summon