A review paper: Text-to-image cryptography in color coding

Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: sym...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 2804
creator Noor, Noor Sattar
Hammood, Dalal Abdulmohsin
Al-Naji, Ali
description Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.
doi_str_mv 10.1063/5.0154228
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0154228</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2862623895</sourcerecordid><originalsourceid>FETCH-LOGICAL-p962-1d700c6d871fa2c6b9a165f16531d38f973a5c707825be0173c055efeba595c63</originalsourceid><addsrcrecordid>eNotUEtLAzEYDKJgrR78BwvehNQvyX559FaKLyh46cFbyGazdUvdxOxW7b93pT3MzGWYYYaQWwYzBlI84AwYlpzrMzJhiIwqyeQ5mQCYkvJSvF-Sq77fAnCjlJ6Q-aLI4bsNP0VyKeR5sQ6_Ax0ibT_dJhQ-H9IQN9mlj0PRdoWPu5hHrttuc00uGrfrw81Jp2T99LhevtDV2_PrcrGiyUhOWa0AvKy1Yo3jXlbGMYnNCMFqoRujhEOvQGmOVQCmhAfE0ITKoUEvxZTcHWNTjl_70A92G_e5Gxst15JLLrTB0XV_dPW-HdzQxs6mPG7IB8vA_l9j0Z6uEX9TD1Pi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2862623895</pqid></control><display><type>conference_proceeding</type><title>A review paper: Text-to-image cryptography in color coding</title><source>AIP Journals Complete</source><creator>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali</creator><contributor>Obed, Adel Ahmed ; ALMohaisen, Abdul Mohsin Naji ; Gharghan, Sadik Kamel ; Mosleh, Mahmood Farhan ; Al-Naji, Ali</contributor><creatorcontrib>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali ; Obed, Adel Ahmed ; ALMohaisen, Abdul Mohsin Naji ; Gharghan, Sadik Kamel ; Mosleh, Mahmood Farhan ; Al-Naji, Ali</creatorcontrib><description>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0154228</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Color coding ; Cryptography ; Encryption ; Image coding</subject><ispartof>AIP conference proceedings, 2023, Vol.2804 (1)</ispartof><rights>Author(s)</rights><rights>2023 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0154228$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,794,4510,23929,23930,25139,27923,27924,76155</link.rule.ids></links><search><contributor>Obed, Adel Ahmed</contributor><contributor>ALMohaisen, Abdul Mohsin Naji</contributor><contributor>Gharghan, Sadik Kamel</contributor><contributor>Mosleh, Mahmood Farhan</contributor><contributor>Al-Naji, Ali</contributor><creatorcontrib>Noor, Noor Sattar</creatorcontrib><creatorcontrib>Hammood, Dalal Abdulmohsin</creatorcontrib><creatorcontrib>Al-Naji, Ali</creatorcontrib><title>A review paper: Text-to-image cryptography in color coding</title><title>AIP conference proceedings</title><description>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</description><subject>Algorithms</subject><subject>Color coding</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Image coding</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotUEtLAzEYDKJgrR78BwvehNQvyX559FaKLyh46cFbyGazdUvdxOxW7b93pT3MzGWYYYaQWwYzBlI84AwYlpzrMzJhiIwqyeQ5mQCYkvJSvF-Sq77fAnCjlJ6Q-aLI4bsNP0VyKeR5sQ6_Ax0ibT_dJhQ-H9IQN9mlj0PRdoWPu5hHrttuc00uGrfrw81Jp2T99LhevtDV2_PrcrGiyUhOWa0AvKy1Yo3jXlbGMYnNCMFqoRujhEOvQGmOVQCmhAfE0ITKoUEvxZTcHWNTjl_70A92G_e5Gxst15JLLrTB0XV_dPW-HdzQxs6mPG7IB8vA_l9j0Z6uEX9TD1Pi</recordid><startdate>20230908</startdate><enddate>20230908</enddate><creator>Noor, Noor Sattar</creator><creator>Hammood, Dalal Abdulmohsin</creator><creator>Al-Naji, Ali</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20230908</creationdate><title>A review paper: Text-to-image cryptography in color coding</title><author>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p962-1d700c6d871fa2c6b9a165f16531d38f973a5c707825be0173c055efeba595c63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Color coding</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Image coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Noor, Noor Sattar</creatorcontrib><creatorcontrib>Hammood, Dalal Abdulmohsin</creatorcontrib><creatorcontrib>Al-Naji, Ali</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Noor, Noor Sattar</au><au>Hammood, Dalal Abdulmohsin</au><au>Al-Naji, Ali</au><au>Obed, Adel Ahmed</au><au>ALMohaisen, Abdul Mohsin Naji</au><au>Gharghan, Sadik Kamel</au><au>Mosleh, Mahmood Farhan</au><au>Al-Naji, Ali</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A review paper: Text-to-image cryptography in color coding</atitle><btitle>AIP conference proceedings</btitle><date>2023-09-08</date><risdate>2023</risdate><volume>2804</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0154228</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2023, Vol.2804 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_scitation_primary_10_1063_5_0154228
source AIP Journals Complete
subjects Algorithms
Color coding
Cryptography
Encryption
Image coding
title A review paper: Text-to-image cryptography in color coding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T10%3A40%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20review%20paper:%20Text-to-image%20cryptography%20in%20color%20coding&rft.btitle=AIP%20conference%20proceedings&rft.au=Noor,%20Noor%20Sattar&rft.date=2023-09-08&rft.volume=2804&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0154228&rft_dat=%3Cproquest_scita%3E2862623895%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2862623895&rft_id=info:pmid/&rfr_iscdi=true