Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Distributed Text-to-Image Encryption Algorithm

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 106 - Number 1
Year of Publication: 2014
Authors:
Abusukhon Ahmad
Talib Mohammad
Hani Mahmoud Almimi
10.5120/18481-9518

Talib Mohammad Abusukhon Ahmad and Hani Mahmoud Almimi. Article: Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications 106(1):1-5, November 2014. Full text available. BibTeX

@article{key:article,
	author = {Abusukhon Ahmad, Talib Mohammad and Hani Mahmoud Almimi},
	title = {Article: Distributed Text-to-Image Encryption Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {106},
	number = {1},
	pages = {1-5},
	month = {November},
	note = {Full text available}
}

Abstract

Data encryption techniques are used to protect data against hackers. Text-to-Image encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The TTIE algorithm is used to map a given text into an image. The algorithm was analyzed and it was found that the dominant time is the storage time, i. e. , saving images on the hard disk). In this paper, it is analyzed that the TTIE algorithm on a single machine when a large data collection is used. A high running time is recorded. To overcome this problem a distributed TTIE (DTTIE) algorithm is proposed in order to investigate reducing the encryption time. In DTTIE a server is responsible for distributing a large data collection (5. 77 GBytes) among a cluster of nodes in a round robin fashion. Each node encrypts the document it receives into an image and then stores the resulting image on its local disk. In this paper the speed up of the proposed algorithm DTTIE is calculated.

References

  • Lakhtaria, K. , (2011) "Protecting computer network with encryption technique: A study", International Journal of u- and e-service, Science and Technology, Vol. 4, No. 2, pp 43-52.
  • Chan, A. , (2011) "A security framework for privacy-preserving data aggregation in wireless sensor networks", ACM transactions on sensor networks, Vol. 7, No. 4.
  • Goldwasser, S. , Micali, S. , L. Rivest, R. , (1998) "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal of Computing Vol. 17, No. 2, pp 281-308.
  • Zaidan, B. , Zaidan, A. , Al-Frajat, A. , and Jalab, H. , (2010) "On the differences between hiding information and cryptography techniques: An overview", Journal of Applied Sciences Vol. 10, No. 15, pp 1650-1655.
  • Singh, A. , Gilhorta, R. , (2011) "Data security using private key encryption system based on arithmetic coding", International Journal of Network Security and its Applications (IJNSA) Vol. 3, No. 3, pp. 58-67.
  • Stalling, W. , (2005) Cryptography and network security principles and practices, 4th ed. Prentice Hall. Available at: http://www. filecrop. com/cryptography-and-network-security-4th-edition. html, [Accessed on 25-Mar-2014].
  • Shannon, C. E. , (1948) "Communication theory of secrecy systems", Bell System Technical Journal, pp 656-715.
  • Bellare, M. , Kilian, J. , Rogaway, P. , (1994) The security of cipher block chaining. In: Proc. of the conference on Advances in cryptology (CRYPTO'94), Lecture Notes in Computer Science, Vol. 839, pp 341-358.
  • Bh, P. , Chandravathi, D. , Roja, P. P. , (2010) "Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz's method", International Journal of Computer Science and Engineering, Vol. 2, No. 5, pp 1904-1907.
  • Koblitz, N. , (1987) "Elliptic Curve cryptosystems", Mathematics of computation Vol. 48, No. 177, pp 203-209.
  • Koblitz, N. , (1994) A Course in number theory and cryptography. 2nd ed. Springer-Verlag.
  • Kumar, K. M. , Azam, M. S. , Rasool, S. , (2010) "Efficient digital encryption algorithm based on matrix scrambling technique", International Journal of Network Security and its Applications (IJNSA) Vol. 2, No. 4, pp 30-41.
  • Abusukhon, A. , Talib, M. , (2012) A Novel Network Security Algorithm Based on Private Key Encryption, International Conference on Cyber Security, Cyber Warfare and Digital Forensic. Kuala Lumpur, Malaysia.
  • Abusukhon, A. , Talib, M. , and Issa, O. , (2012) "Secure network communication based on text to image encryption", International Journal of Cyber-Security and Digital Forensics (IJCSDF), The Society of Digital Information and Wireless Communications (SDIWC) Vol. 1, No. 4, pp 263-271.
  • Abusukhon, A. , (2013) "Block Cipher encryption for Text-to-Image encryption algorithm", International Journal of Computer Engineering and Technology (IJCET) Vol. 4, pp 50-58.
  • Abusukhon,A. , Talib, M, Nabulsi,M. , (2012) "Analyzing the efficiency of Text-to-Image encryption algorithm", International Journal of Advanced Computer Science and Applications ( IJACSA ) Vol. 3, No. 11, pp 35 – 38.