A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been propo...
Saved in:
| Published in: | Computers (Basel) Vol. 11; no. 3; p. 39 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Basel
MDPI AG
01.03.2022
|
| Subjects: | |
| ISSN: | 2073-431X, 2073-431X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted. |
|---|---|
| AbstractList | Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted. |
| Author | Chahl, Javaan Noor, Noor Sattar Hammood, Dalal Abdulmohsin Al-Naji, Ali |
| Author_xml | – sequence: 1 givenname: Noor Sattar surname: Noor fullname: Noor, Noor Sattar – sequence: 2 givenname: Dalal Abdulmohsin surname: Hammood fullname: Hammood, Dalal Abdulmohsin – sequence: 3 givenname: Ali orcidid: 0000-0002-8840-9235 surname: Al-Naji fullname: Al-Naji, Ali – sequence: 4 givenname: Javaan orcidid: 0000-0001-6496-0543 surname: Chahl fullname: Chahl, Javaan |
| BookMark | eNp9UU1LAzEQDaJg1f4AbwueV5OdJJs9lvpVED3YgreQZid1a3dTs1nUf-_WqoiCc5nH8N6bYd4B2W18g4QcM3oKUNAz6-t1FzG0jFGgFIodMshoDikH9rD7A--TYdsuaV8FA5WxAZmNkkvTxmSKrzGNPp3UZoHJRWPD2zpWvknP8Qsmo9XChyo-1onzIblH2wVMbjG--PCUjH1dd01lzYZ6RPacWbU4_OyHZHZ5MR1fpzd3V5Px6Ca1_faYAiDwObfgMltKlOCQSyYkp6WyrJ8V4ITM5oCINLfSCGEUdyjnHAEsh0My2fqW3iz1OlS1CW_am0p_DHxYaBNiZVeoS1WUKJVyylJe5qCYEByMUMzmOQjRe51svdbBP3fYRr30XWj683Umebah5EXPYluWDb5tA7rvrYzqTRj6Txi9Jv-lsVX8-FMMplr9o3wHkoGTlw |
| CitedBy_id | crossref_primary_10_1016_j_chaos_2024_115001 crossref_primary_10_1007_s11277_022_09901_w crossref_primary_10_1080_03772063_2025_2505105 crossref_primary_10_1371_journal_pone_0290831 crossref_primary_10_3390_inventions8040102 crossref_primary_10_1007_s11042_024_19093_z crossref_primary_10_2298_TSCI2406205B crossref_primary_10_1049_tje2_70124 crossref_primary_10_3390_computers12080160 |
| Cites_doi | 10.1016/j.eswa.2021.114978 10.1007/978-981-16-5655-2_13 10.1109/ACCESS.2021.3060947 10.1002/cpe.6649 10.1016/j.optlaseng.2020.106485 10.4018/978-1-7998-6988-7.ch008 10.1007/978-981-13-0277-0 10.3390/e23121648 10.14569/IJACSA.2012.031106 10.1016/j.procs.2020.03.198 10.1109/ICIDM51048.2020.9339674 10.1109/ICECA49313.2020.9297478 10.3390/s20010083 10.1016/j.procs.2016.02.108 10.1016/j.optlaseng.2019.105821 10.1016/j.chaos.2020.110344 10.1007/s11831-020-09425-1 10.1007/s40747-020-00162-3 10.1080/03081079.2021.1919102 10.1063/1.5142095 10.1109/CyberSec.2012.6246080 10.1016/j.chaos.2020.110582 10.1007/s00521-019-04637-4 10.1007/s11071-021-06576-z 10.1007/s11042-020-09469-2 10.1080/09720529.2019.1569821 10.1109/ACCESS.2021.3081024 10.1007/s00521-017-2970-3 10.1007/s11045-018-0589-x 10.1109/SPIN.2018.8474240 10.1007/s11554-020-01008-4 10.1109/ICOIN50884.2021.9333881 10.1007/978-3-030-75945-2_14 |
| ContentType | Journal Article |
| Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
| DOI | 10.3390/computers11030039 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: ProQuest Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2073-431X |
| ExternalDocumentID | oai_doaj_org_article_d89de688f8c04d73815543a581c77355 10_3390_computers11030039 |
| GroupedDBID | 5VS 8FE 8FG AADQD AAYXX ABUWG ADBBV AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ GROUPED_DOAJ HCIFZ IAO ICD ITC IVC K6V K7- KQ8 MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC 3V. 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c382t-33e34b4c3f2cd6e63fe4615640d8c12cd93f562b3eee07c6a55a84fe6b4e33c43 |
| IEDL.DBID | P5Z |
| ISICitedReferencesCount | 11 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000775687000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2073-431X |
| IngestDate | Mon Nov 10 04:34:59 EST 2025 Fri Jul 25 07:25:40 EDT 2025 Tue Nov 18 22:22:58 EST 2025 Sat Nov 29 07:17:15 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c382t-33e34b4c3f2cd6e63fe4615640d8c12cd93f562b3eee07c6a55a84fe6b4e33c43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8840-9235 0000-0001-6496-0543 |
| OpenAccessLink | https://www.proquest.com/docview/2642355379?pq-origsite=%requestingapplication% |
| PQID | 2642355379 |
| PQPubID | 2032413 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_d89de688f8c04d73815543a581c77355 proquest_journals_2642355379 crossref_primary_10_3390_computers11030039 crossref_citationtrail_10_3390_computers11030039 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-03-01 |
| PublicationDateYYYYMMDD | 2022-03-01 |
| PublicationDate_xml | – month: 03 year: 2022 text: 2022-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Computers (Basel) |
| PublicationYear | 2022 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Wang (ref_37) 2020; 143 Singh (ref_3) 2015; 2 ref_14 Khan (ref_27) 2019; 30 ref_12 ref_33 Naji (ref_4) 2020; 2203 Arun (ref_16) 2015; 1 Lakshmi (ref_32) 2019; 32 Shah (ref_36) 2020; 17 Dhal (ref_23) 2020; 28 Singh (ref_2) 2014; 2 Daoui (ref_22) 2021; 177 ref_19 ref_18 (ref_41) 2017; 14 (ref_13) 2016; 30 Luo (ref_24) 2021; 9 Abusukhon (ref_15) 2019; 22 Li (ref_25) 2021; 9 Wahsheh (ref_44) 2021; 2021 Alaya (ref_8) 2021; 58 Tutueva (ref_31) 2020; 141 Ibada (ref_10) 2021; 1962 Huang (ref_30) 2020; 124 Sumathi (ref_38) 2020; 7 Degadwala (ref_34) 2020; 167 Patil (ref_11) 2016; 78 ref_21 ref_42 ref_40 ref_1 Midoun (ref_39) 2020; 139 Ahmad (ref_28) 2018; 30 ref_29 Bououden (ref_20) 2021; 50 Abusukhon (ref_43) 2021; 34 Naji (ref_9) 2019; 18 ref_26 Liu (ref_35) 2021; 104 Abusukhon (ref_17) 2016; 2225 Abusukhon (ref_5) 2013; 4 ref_7 ref_6 Fu (ref_45) 2020; 79 |
| References_xml | – volume: 177 start-page: 114978 year: 2021 ident: ref_22 article-title: New robust method for image copyright protection using histogram features and Sine Cosine Algorithm publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2021.114978 – ident: ref_7 doi: 10.1007/978-981-16-5655-2_13 – volume: 9 start-page: 31792 year: 2021 ident: ref_24 article-title: Underwater Image Restoration and Enhancement Based on a Fusion Algorithm with Color Balance, Contrast Optimization, and Histogram Stretching publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3060947 – volume: 34 start-page: e6649 year: 2021 ident: ref_43 article-title: An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm publication-title: Concurr. Comput. Pr. Exp. doi: 10.1002/cpe.6649 – volume: 139 start-page: 106485 year: 2020 ident: ref_39 article-title: A sensitive dynamic mutual encryption system based on a new 1D chaotic map publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106485 – volume: 4 start-page: 50 year: 2013 ident: ref_5 article-title: Block cipher encryption for Text-to-Image Encryption algorithm publication-title: Int. J. Comput. Eng. Technol. (IJCET) – ident: ref_6 doi: 10.4018/978-1-7998-6988-7.ch008 – volume: 1 start-page: 37 year: 2015 ident: ref_16 article-title: AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic publication-title: Int. J. Recent Res. Sci. Eng. Technol. – ident: ref_21 doi: 10.1007/978-981-13-0277-0 – volume: 2021 start-page: 5540670 year: 2021 ident: ref_44 article-title: Secure Real-Time Artificial Intelligence System against Malicious QR Code Links publication-title: Secur. Commun. Networks – volume: 2 start-page: 1 year: 2015 ident: ref_3 article-title: Combination of RGB Substitution for Text to Image Encryption Technique using AES publication-title: Spvryans Int. J. Eng. Sci. Technol. – volume: 14 start-page: 851 year: 2017 ident: ref_41 article-title: A New Implementation of Text-To-Image Encryption Using Multilevel Substitution and Transposition publication-title: Int. J. Comput. Sci. Inf. Secur. – ident: ref_26 doi: 10.3390/e23121648 – volume: 2225 start-page: 410 year: 2016 ident: ref_17 article-title: A novel network security algorithm based on encrypting text into a White-Page Image publication-title: Lect. Notes Eng. Comput. Sci. – ident: ref_42 doi: 10.14569/IJACSA.2012.031106 – ident: ref_18 – volume: 167 start-page: 213 year: 2020 ident: ref_34 article-title: Novel Image Watermarking Approach against Noise and RST Attacks publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2020.03.198 – volume: 1962 start-page: 012061 year: 2021 ident: ref_10 article-title: RGB Image Encryption using Hill Algorithm and Chaos System publication-title: J. Physics: Conf. Ser. – ident: ref_1 doi: 10.1109/ICIDM51048.2020.9339674 – volume: 30 start-page: 128 year: 2016 ident: ref_13 article-title: It doesn’t speak to me’: Understanding student of color resistance to critical race pedagogy publication-title: Int. J. Qual. Stud. Educ. – ident: ref_19 doi: 10.1109/ICECA49313.2020.9297478 – ident: ref_29 doi: 10.3390/s20010083 – volume: 18 start-page: 24 year: 2019 ident: ref_9 article-title: Implantation of Caesar and Hill Cipher on Database for Better Security publication-title: Eur. J. Technol. Eng. – volume: 78 start-page: 617 year: 2016 ident: ref_11 article-title: A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2016.02.108 – volume: 124 start-page: 105821 year: 2020 ident: ref_30 article-title: Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105821 – volume: 141 start-page: 110344 year: 2020 ident: ref_31 article-title: Construction of one-way hash functions with increased key space using adaptive chaotic maps publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2020.110344 – volume: 28 start-page: 1471 year: 2020 ident: ref_23 article-title: Histogram Equalization Variants as Optimization Problems: A Review publication-title: Arch. Comput. Methods Eng. doi: 10.1007/s11831-020-09425-1 – volume: 7 start-page: 1733 year: 2020 ident: ref_38 article-title: A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography publication-title: Complex Intell. Syst. doi: 10.1007/s40747-020-00162-3 – volume: 50 start-page: 501 year: 2021 ident: ref_20 article-title: A novel fractional piecewise linear map: Regular and chaotic dynamics publication-title: Int. J. Gen. Syst. doi: 10.1080/03081079.2021.1919102 – volume: 58 start-page: 102779 year: 2021 ident: ref_8 article-title: Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks publication-title: J. Inf. Secur. Appl. – volume: 2203 start-page: 020003 year: 2020 ident: ref_4 article-title: Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography publication-title: AIP Conf. Proc. doi: 10.1063/1.5142095 – ident: ref_14 doi: 10.1109/CyberSec.2012.6246080 – volume: 143 start-page: 110582 year: 2020 ident: ref_37 article-title: High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2020.110582 – volume: 32 start-page: 11477 year: 2019 ident: ref_32 article-title: Hopfield attractor-trusted neural network: An attack-resistant image encryption publication-title: Neural Comput. Appl. doi: 10.1007/s00521-019-04637-4 – volume: 104 start-page: 4615 year: 2021 ident: ref_35 article-title: A chaotic image encryption algorithm based on coupled piecewise sine map and sensitive diffusion structure publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06576-z – volume: 79 start-page: 32471 year: 2020 ident: ref_45 article-title: Distributed color QR code with high-capability and fast decoding publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09469-2 – volume: 22 start-page: 65 year: 2019 ident: ref_15 article-title: A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm publication-title: J. Discret. Math. Sci. Cryptogr. doi: 10.1080/09720529.2019.1569821 – volume: 9 start-page: 73012 year: 2021 ident: ref_25 article-title: Complexity Analysis of Three-Dimensional Fractional-Order Chaotic System Based on Entropy Theory publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3081024 – volume: 30 start-page: 3847 year: 2018 ident: ref_28 article-title: A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation publication-title: Neural Comput. Appl. doi: 10.1007/s00521-017-2970-3 – volume: 30 start-page: 943 year: 2019 ident: ref_27 article-title: Chaos based efficient selective image encryption publication-title: Multidimens. Syst. Signal Process. doi: 10.1007/s11045-018-0589-x – ident: ref_33 doi: 10.1109/SPIN.2018.8474240 – volume: 2 start-page: 58 year: 2014 ident: ref_2 article-title: Data security using private key encryption system based on arithmetic coding publication-title: Int. J. Netw. Secur. Its Appl. – volume: 17 start-page: 139 year: 2020 ident: ref_36 article-title: Efficient image encryption scheme based on generalized logistic map for real time image processing publication-title: J. Real-Time Image Process. doi: 10.1007/s11554-020-01008-4 – ident: ref_40 doi: 10.1109/ICOIN50884.2021.9333881 – ident: ref_12 doi: 10.1007/978-3-030-75945-2_14 |
| SSID | ssj0000913821 |
| Score | 2.3319218 |
| Snippet | Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 39 |
| SubjectTerms | Algorithms capacity Cell division Communication compression Cryptography Data encryption Data recovery decryption Encryption Network security Receivers & amplifiers Security TTIED-CMYK mode |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA8yPHjxW5xOycGTUNY2aZIe58dQkOFhk91Km77oYOukq4L_vS9pNyYDvXgL6QttX17eR5v8foRcZRFqPsciRymdYoGSGS8WOXicGxaaLNC-o054eZKDgRqP4-c1qi-7J6yGB64V181VnINQyigclksMMBgAWRqpQEuJwdJ6X1_Ga8WU88GxxdYL6t-YDOv6rm5IEhaBJdbyLTn4WiByeP0b7tjFmP4-2W2SQ9qrH-qAbEFxSPaWxAu0WYdHZNSj_XRR0aEtW6u59zhDr0DvC11-OQ_g3cGySXvT13k5qd5mFNNT6j6vAx3Um7_pj-Mhx2TUvx_ePngNP4Kn8eUqjzFgPOOamVDnAgQzwIUFf_FzpQPsi5nB9CZjAOBLLdIoShU3IDIOjGnOTkirmBdwSigKqSiMQymziIvQYCuTAngOWkYhmDbxl8pKdAMebjkspgkWEVa_yYZ-2-R6NeS9Rs74TfjGzsBK0IJeuw40haQxheQvU2iTznL-kmYlLhJM-EK8xmR89h_3OCc7oT0A4XahdUirKj_ggmzrz2qyKC-dEX4DGxnhew priority: 102 providerName: Directory of Open Access Journals |
| Title | A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication |
| URI | https://www.proquest.com/docview/2642355379 https://doaj.org/article/d89de688f8c04d73815543a581c77355 |
| Volume | 11 |
| WOSCitedRecordID | wos000775687000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: DOA dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: P5Z dateStart: 20120101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database (ProQuest) customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: K7- dateStart: 20120101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: BENPR dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content Database customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: PIMPY dateStart: 20120101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLdg48CF8SkKW-UDJyRrie3Yzgl1rBUTUEVoQ4NLlNjPG9LWjiabxH_Ps-sU0KRduESW7SiRn_2-bP9-hLxpCxx5h0GOMbbBAKX1rFQOmJRecN_mNovUCV8_6fncnJ6WVUq4delY5aATo6J2Sxty5PtouDnaRqHLd1c_WWCNCruriULjPtkOKAmBuqEqvm9yLAHz0vB8vZkpMLrft4kqocsDvVYWKML_MkcRtf-WUo6WZrbzv__4mDxKPiadrCfFE3IPFk_JzsDfQNNyfkZOJnTWdD09DtFvv2RHl6hc6HRhV7-iImGHMBTp5OIMv9SfX1L0cmnM0gOdr8-Q039umTwnJ7Pp8fsPLNEsMIuj0zMhQMhWWuG5dQqU8CBVwJDJnLE51pXCo5fUCgDItFVNUTRGelCtBCGsFC_I1mK5gJeEYidT8JJr3RZScY-lViuQDqwuOPgRyYbRrm3CIA9UGBc1xiJBQPUtAY3I280rV2sAjrs6HwQRbjoG7OxYsVyd1Wkp1s6UDpQx3uBEdBpdFnSpRFOY3GqN4huR3UG6dVrQXf1HtK_ubn5NHvJwQyIeU9slW_3qGvbIA3vT_-hWY7J9MJ1XX8Yx9MfnR83Gcc5iS3X0ufr2Gx6D9ew |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VgkQvlFfVhQI-wAXJamI7sXNAaKFddbXLisMW9RYSe1yQ2t2yCaD-KX4j4zwWUKXeeuBmOU6k2J-_mfFjPoCXZUI97yjIMcYWFKCUnmepQ66Ul8KXsY0a6YRPUz2bmZOT7OMG_OrvwoRjlT0nNkTtljaske-T4RZkG6XO3l5840E1Kuyu9hIaLSwmePmTQrbqzfiAxveVEKPD-fsj3qkKcCuNqLmUKFWprPTCuhRT6VGlIWVK5IyNqS6TnpyCUiJipG1aJElhlMe0VCilVZK-ewtuK2l0mFcTzddrOiHHphFxu3kqZRbt206aoYqDnFcUJMn_Mn-NSsAVI9BYttH2_9Yn9-Fe50OzYQv6B7CBi4ew3etTsI6uHsHxkI2KqmbzEN3XSz4-J_Jkhwu7umyIkh9gX2TDs1P6s_rLOSMvnjW7EMhm7Rl59s8tmsdwfCM_twObi-UCd4FRI5OITGhdJioVnkqlTlE5tDoR6AcQ9aOb2y7HepD6OMsp1gqAyK8AYgCv169ctAlGrmv8LkBm3TDkBm8qlqvTvKOa3JnMYWqMNzTRnCaXjFxGWSQmtloTXAaw16Mp7wiryv9A6cn1j1_A3aP5h2k-Hc8mT2FLhNsgzZG8PdisV9_xGdyxP-qv1ep5MzcYfL5p4P0Gnu9OUA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VglAvlFfVhQI-wAUp2sR2bOeA0MJ2xarVag8tqriExB4XpHa3bAKof41fxziPBVSptx64WY4dyfbnedjj-QBelinNvCMnxxhbkINS-ihTDiMpveC-TGzcUCd8PNSzmTk5yeYb8Kt_CxPCKnuZ2Ahqt7ThjHxIipuTbhQ6G_ouLGI-nry9-BYFBqlw09rTabQQOcDLn-S-VW-mY1rrV5xP9o_ef4g6hoHICsPrSAgUspRWeG6dQiU8ShXSp8TO2ITqMuHJQCgFIsbaqiJNCyM9qlKiEFYK-u8tuK3JxwzhhPP00_p8J-TbNDxpL1KFyOKh7WgaqiRQe8WBnvwvVdgwBlxRCI2Wm2z_z_NzH-51tjUbtZvhAWzg4iFs97wVrBNjj-B4xCZFVbOj4PXXy2h6TkKV7S_s6rIRoNEY-yIbnZ3SyOov54yse9bcTiCbtbHz7J_XNY_h-EYGtwObi-UCd4FRI5PyjGtdplJxT6VSK5QOrU45-gHE_Urntsu9HihAznLywQI48ivgGMDrdZeLNvHIdY3fBfisG4ac4U3FcnWadyIodyZzqIzxhjag02SqkSkpitQkVmuCzgD2emTlnSCr8j-wenL95xdwl_CWH05nB09hi4dHIk2k3h5s1qvv-Azu2B_112r1vNkmDD7fNO5-A8owV3Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Fast+Text-to-Image+Encryption-Decryption+Algorithm+for+Secure+Network+Communication&rft.jtitle=Computers+%28Basel%29&rft.au=Noor+Sattar+Noor&rft.au=Dalal+Abdulmohsin+Hammood&rft.au=Al-Naji%2C+Ali&rft.au=Chahl%2C+Javaan&rft.date=2022-03-01&rft.pub=MDPI+AG&rft.eissn=2073-431X&rft.volume=11&rft.issue=3&rft.spage=39&rft_id=info:doi/10.3390%2Fcomputers11030039&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-431X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-431X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-431X&client=summon |