Abstract

Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted.

Highlights

  • Sensitive information in the form of text, pictures, audio, and video are exchanged over communication systems

  • This study proposes a fast Text-to-Image Encryption-Decryption (TTIED) algorithm depending on the CMYK mode where the number of layers increases, the capacity of the characters to be encrypted increases, and the compression rate for encrypted-decrypted files decreases

  • This paper introduces the TTIED-CMYK algorithm to improve security, capacity, and processing time

Read more

Summary

Introduction

Sensitive information in the form of text, pictures, audio, and video are exchanged over communication systems. Symmetric means that the same key is used between sender and receiver in encryption and decryption processes. Many approaches, such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Rivest–Shamir–Adleman (RSA), Triple Data Encryption Standard (3-DES) and other established procedures, are used to encrypt and decrypt data [9–11]. These approaches are still ineffective at encrypting large-scale text with high redundancy and large storage capacities. Researchers have developed various text-to-image encryption algorithms to increase text security and efficiency, improving robust cryptographic algorithms

Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.