CFP last date
22 April 2024
Reseach Article

Distributed Text-to-Image Encryption Algorithm

by Abusukhon Ahmad, Talib Mohammad, Hani Mahmoud Almimi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 1
Year of Publication: 2014
Authors: Abusukhon Ahmad, Talib Mohammad, Hani Mahmoud Almimi
10.5120/18481-9518

Abusukhon Ahmad, Talib Mohammad, Hani Mahmoud Almimi . Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications. 106, 1 ( November 2014), 1-5. DOI=10.5120/18481-9518

@article{ 10.5120/18481-9518,
author = { Abusukhon Ahmad, Talib Mohammad, Hani Mahmoud Almimi },
title = { Distributed Text-to-Image Encryption Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 1 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number1/18481-9518/ },
doi = { 10.5120/18481-9518 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:13.072629+05:30
%A Abusukhon Ahmad
%A Talib Mohammad
%A Hani Mahmoud Almimi
%T Distributed Text-to-Image Encryption Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 1
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data encryption techniques are used to protect data against hackers. Text-to-Image encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The TTIE algorithm is used to map a given text into an image. The algorithm was analyzed and it was found that the dominant time is the storage time, i. e. , saving images on the hard disk). In this paper, it is analyzed that the TTIE algorithm on a single machine when a large data collection is used. A high running time is recorded. To overcome this problem a distributed TTIE (DTTIE) algorithm is proposed in order to investigate reducing the encryption time. In DTTIE a server is responsible for distributing a large data collection (5. 77 GBytes) among a cluster of nodes in a round robin fashion. Each node encrypts the document it receives into an image and then stores the resulting image on its local disk. In this paper the speed up of the proposed algorithm DTTIE is calculated.

References
  1. Lakhtaria, K. , (2011) "Protecting computer network with encryption technique: A study", International Journal of u- and e-service, Science and Technology, Vol. 4, No. 2, pp 43-52.
  2. Chan, A. , (2011) "A security framework for privacy-preserving data aggregation in wireless sensor networks", ACM transactions on sensor networks, Vol. 7, No. 4.
  3. Goldwasser, S. , Micali, S. , L. Rivest, R. , (1998) "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal of Computing Vol. 17, No. 2, pp 281-308.
  4. Zaidan, B. , Zaidan, A. , Al-Frajat, A. , and Jalab, H. , (2010) "On the differences between hiding information and cryptography techniques: An overview", Journal of Applied Sciences Vol. 10, No. 15, pp 1650-1655.
  5. Singh, A. , Gilhorta, R. , (2011) "Data security using private key encryption system based on arithmetic coding", International Journal of Network Security and its Applications (IJNSA) Vol. 3, No. 3, pp. 58-67.
  6. Stalling, W. , (2005) Cryptography and network security principles and practices, 4th ed. Prentice Hall. Available at: http://www. filecrop. com/cryptography-and-network-security-4th-edition. html, [Accessed on 25-Mar-2014].
  7. Shannon, C. E. , (1948) "Communication theory of secrecy systems", Bell System Technical Journal, pp 656-715.
  8. Bellare, M. , Kilian, J. , Rogaway, P. , (1994) The security of cipher block chaining. In: Proc. of the conference on Advances in cryptology (CRYPTO'94), Lecture Notes in Computer Science, Vol. 839, pp 341-358.
  9. Bh, P. , Chandravathi, D. , Roja, P. P. , (2010) "Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz's method", International Journal of Computer Science and Engineering, Vol. 2, No. 5, pp 1904-1907.
  10. Koblitz, N. , (1987) "Elliptic Curve cryptosystems", Mathematics of computation Vol. 48, No. 177, pp 203-209.
  11. Koblitz, N. , (1994) A Course in number theory and cryptography. 2nd ed. Springer-Verlag.
  12. Kumar, K. M. , Azam, M. S. , Rasool, S. , (2010) "Efficient digital encryption algorithm based on matrix scrambling technique", International Journal of Network Security and its Applications (IJNSA) Vol. 2, No. 4, pp 30-41.
  13. Abusukhon, A. , Talib, M. , (2012) A Novel Network Security Algorithm Based on Private Key Encryption, International Conference on Cyber Security, Cyber Warfare and Digital Forensic. Kuala Lumpur, Malaysia.
  14. Abusukhon, A. , Talib, M. , and Issa, O. , (2012) "Secure network communication based on text to image encryption", International Journal of Cyber-Security and Digital Forensics (IJCSDF), The Society of Digital Information and Wireless Communications (SDIWC) Vol. 1, No. 4, pp 263-271.
  15. Abusukhon, A. , (2013) "Block Cipher encryption for Text-to-Image encryption algorithm", International Journal of Computer Engineering and Technology (IJCET) Vol. 4, pp 50-58.
  16. Abusukhon,A. , Talib, M, Nabulsi,M. , (2012) "Analyzing the efficiency of Text-to-Image encryption algorithm", International Journal of Advanced Computer Science and Applications ( IJACSA ) Vol. 3, No. 11, pp 35 – 38.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed encryption Algorithm Cluster of nodes Secured communication Encryption & Decryption Private key encoding.