A review paper: Text-to-image cryptography in color coding
Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: sym...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 2804 |
creator | Noor, Noor Sattar Hammood, Dalal Abdulmohsin Al-Naji, Ali |
description | Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on. |
doi_str_mv | 10.1063/5.0154228 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0154228</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2862623895</sourcerecordid><originalsourceid>FETCH-LOGICAL-p962-1d700c6d871fa2c6b9a165f16531d38f973a5c707825be0173c055efeba595c63</originalsourceid><addsrcrecordid>eNotUEtLAzEYDKJgrR78BwvehNQvyX559FaKLyh46cFbyGazdUvdxOxW7b93pT3MzGWYYYaQWwYzBlI84AwYlpzrMzJhiIwqyeQ5mQCYkvJSvF-Sq77fAnCjlJ6Q-aLI4bsNP0VyKeR5sQ6_Ax0ibT_dJhQ-H9IQN9mlj0PRdoWPu5hHrttuc00uGrfrw81Jp2T99LhevtDV2_PrcrGiyUhOWa0AvKy1Yo3jXlbGMYnNCMFqoRujhEOvQGmOVQCmhAfE0ITKoUEvxZTcHWNTjl_70A92G_e5Gxst15JLLrTB0XV_dPW-HdzQxs6mPG7IB8vA_l9j0Z6uEX9TD1Pi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2862623895</pqid></control><display><type>conference_proceeding</type><title>A review paper: Text-to-image cryptography in color coding</title><source>AIP Journals Complete</source><creator>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali</creator><contributor>Obed, Adel Ahmed ; ALMohaisen, Abdul Mohsin Naji ; Gharghan, Sadik Kamel ; Mosleh, Mahmood Farhan ; Al-Naji, Ali</contributor><creatorcontrib>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali ; Obed, Adel Ahmed ; ALMohaisen, Abdul Mohsin Naji ; Gharghan, Sadik Kamel ; Mosleh, Mahmood Farhan ; Al-Naji, Ali</creatorcontrib><description>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0154228</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Color coding ; Cryptography ; Encryption ; Image coding</subject><ispartof>AIP conference proceedings, 2023, Vol.2804 (1)</ispartof><rights>Author(s)</rights><rights>2023 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0154228$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,794,4510,23929,23930,25139,27923,27924,76155</link.rule.ids></links><search><contributor>Obed, Adel Ahmed</contributor><contributor>ALMohaisen, Abdul Mohsin Naji</contributor><contributor>Gharghan, Sadik Kamel</contributor><contributor>Mosleh, Mahmood Farhan</contributor><contributor>Al-Naji, Ali</contributor><creatorcontrib>Noor, Noor Sattar</creatorcontrib><creatorcontrib>Hammood, Dalal Abdulmohsin</creatorcontrib><creatorcontrib>Al-Naji, Ali</creatorcontrib><title>A review paper: Text-to-image cryptography in color coding</title><title>AIP conference proceedings</title><description>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</description><subject>Algorithms</subject><subject>Color coding</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Image coding</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotUEtLAzEYDKJgrR78BwvehNQvyX559FaKLyh46cFbyGazdUvdxOxW7b93pT3MzGWYYYaQWwYzBlI84AwYlpzrMzJhiIwqyeQ5mQCYkvJSvF-Sq77fAnCjlJ6Q-aLI4bsNP0VyKeR5sQ6_Ax0ibT_dJhQ-H9IQN9mlj0PRdoWPu5hHrttuc00uGrfrw81Jp2T99LhevtDV2_PrcrGiyUhOWa0AvKy1Yo3jXlbGMYnNCMFqoRujhEOvQGmOVQCmhAfE0ITKoUEvxZTcHWNTjl_70A92G_e5Gxst15JLLrTB0XV_dPW-HdzQxs6mPG7IB8vA_l9j0Z6uEX9TD1Pi</recordid><startdate>20230908</startdate><enddate>20230908</enddate><creator>Noor, Noor Sattar</creator><creator>Hammood, Dalal Abdulmohsin</creator><creator>Al-Naji, Ali</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20230908</creationdate><title>A review paper: Text-to-image cryptography in color coding</title><author>Noor, Noor Sattar ; Hammood, Dalal Abdulmohsin ; Al-Naji, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p962-1d700c6d871fa2c6b9a165f16531d38f973a5c707825be0173c055efeba595c63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Color coding</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Image coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Noor, Noor Sattar</creatorcontrib><creatorcontrib>Hammood, Dalal Abdulmohsin</creatorcontrib><creatorcontrib>Al-Naji, Ali</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Noor, Noor Sattar</au><au>Hammood, Dalal Abdulmohsin</au><au>Al-Naji, Ali</au><au>Obed, Adel Ahmed</au><au>ALMohaisen, Abdul Mohsin Naji</au><au>Gharghan, Sadik Kamel</au><au>Mosleh, Mahmood Farhan</au><au>Al-Naji, Ali</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A review paper: Text-to-image cryptography in color coding</atitle><btitle>AIP conference proceedings</btitle><date>2023-09-08</date><risdate>2023</risdate><volume>2804</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security attacks. Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors. Researchers proposed different techniques to implement this approach to safeguard text data against attacks. This work compares various types of text to image encryption and decryption techniques based on the RGB and CMYK color values and provides a comparison between them using various parameters such as application, program language, type of image, number of keys used, image dimension used, encryption and decryption processing time, advantage and disadvantage, image size used, evaluation measures, and so on.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0154228</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2023, Vol.2804 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_scitation_primary_10_1063_5_0154228 |
source | AIP Journals Complete |
subjects | Algorithms Color coding Cryptography Encryption Image coding |
title | A review paper: Text-to-image cryptography in color coding |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T10%3A40%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20review%20paper:%20Text-to-image%20cryptography%20in%20color%20coding&rft.btitle=AIP%20conference%20proceedings&rft.au=Noor,%20Noor%20Sattar&rft.date=2023-09-08&rft.volume=2804&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0154228&rft_dat=%3Cproquest_scita%3E2862623895%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2862623895&rft_id=info:pmid/&rfr_iscdi=true |