Open Access
Subscription Access
Open Access
Subscription Access
Enhancing Transmitted Text Security with Image Key Cryptography and Deepnets
Subscribe/Renew Journal
This paper proposes a novel approach to improving the security of transmitted text using a combination of image key cryptography and deepnets. The traditional methods of text encryption and decryption rely heavily on mathematical algorithms, which can be susceptible to attacks. In this paper, we introduce the concept of image key cryptography, where an image is used as the encryption key. By utilizing the complex patterns and structures present in images, the security of the encryption process is significantly enhanced. Additionally, we employ deepnets, a type of deep neural network, to further strengthen the encryption process and provide an additional layer of security. We evaluate the proposed approach through experiments and compare its performance with existing encryption methods. The results demonstrate that our method offers improved security and robustness against attacks, making it a promising solution for transmitting sensitive text data.
Keywords
Transmitted Text Security, Image Key Cryptography, Deepnets, Encryption/Decryption.
Subscription
Login to verify subscription
User
Font Size
Information
- Y. Liu and D. Gong, “A Novel Image Key Cryptography Algorithm based on Improved DES”, IEEE Access, Vol. 6, 10721-10729, 2018.
- M. Ramkumar and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
- B. Gobinathan, S.A. Moeed and V. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
- C.S.G. Dhas and T.D. Geleto, “D-PPSOK Clustering Algorithm with Data Sampling for Clustering Big Data Analysis”, Academic Press, 2022.
- Y. Chen, L. Shi and H. Tan, “Text Encryption Algorithm based on Deep Learning”, Proceedings of International Conference on Artificial Intelligence in Information and Communication, pp. 312-316, 2019.
- L. Hu and Y. Lai, “Text Encryption based on Deep Learning Algorithm”, International Journal of Security and Its Applications, Vol. 14, No. 2, pp. 193-202, 2020.
- K. Praghash and T. Karthikeyan, “Privacy Preservation of the User Data and Properly Balancing between Privacy and Utility”, International Journal of Business Intelligence and Data Mining, Vol. 20, No. 4, pp. 394-411, 2022.
- M. Jagdish, A. Alqahtani and V. Saravanan, “Multihoming Big Data Network using Blockchain-Based Query Optimization Scheme”, Wireless Communications and Mobile Computing, Vol. 2022, pp. 1-15, 2022.
- Y. Zeng, W. Lu and Q. Luo, “Text Encryption Algorithm based on Deep Neural Network and Fuzzy Logic”, Proceedings of IEEE International Conference on Information Technology, Networking, Electronic and Automation Control, pp. 1114-1119, 2019.
- L. Qi and Y. Chen, “A Text Encryption Algorithm based on Convolutional Neural Network”, Proceedings of International Conference on Measuring Technology and Mechatronics Automation, pp. 256-260, 2017.
- M.S. Chen and H.Y. Lai, “Text Encryption using Visual Cryptography”, Proceedings of International Conference on Applied System Innovation, pp. 109-111, 2015.
- X. Li and L. Li, “Deep Learning-Based Text Encryption”, Proceedings of International Conference on Computational Intelligence and Security, pp. 181-185, 2017.
- R. Sathya and M. Sangeetha, “Secure Text Transmission using Hybrid Cryptography and Steganography”, Proceedings of International Conference on Intelligent Computing and Control Systems, pp. 1660-1664, 2018.
- X. Zhang and J. Wu, “Enhancing Text Security with Homomorphic Encryption”, Security and Communication Networks, Vol. 2020, pp. 1-13, 2020.
- A. Gupta, A. Pal and M.S. Chauhan, “Image Key Cryptography for Enhanced Text Security”, Proceedings of IEEE International Conference on Emerging Trends in Computing and Communication Engineering, pp. 1-5, 2021.
Abstract Views: 170
PDF Views: 0