A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 12
Abstract
Nowadays, after the significant development in the Internet, communication and information exchange around the world has become easier and faster than before. One may send an e-mail or perform money transaction (using a credit card) while being at home. The Internet users can also share resources (storage, memory, etc.) or invoke a method on a remote machine. All these activities require securing data while the data are sent through the global network. There are various methods for securing data on the internet and ensuring its privacy; one of these methods is data encryption. This technique is used to protect the data from hackers by scrambling these data into a non-readable form. In this paper, we propose a novel method for data encryption based on the transformation of a text message into a barcode image. In this paper, the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed.
Authors and Affiliations
Abusukhon Ahmad, Bilal Hawashin
Design of Reversible Counter
This article presents a research work on the design and synthesis of sequential circuits and flip-flops that are available in digital arena; and describes a new synthesis design of reversible counter that is optimized in...
Deep Learning Algorithm for Cyberbullying Detection
Cyberbullying is a crime where one person becomes the target of harassment and hate. Many cyberbullying detection approaches have been introduced, however, they were largely based on textual and user features. Most of th...
Optimization of OADM DWDM Ring Optical Network using Various Modulation Formats
In this paper, the performance of the ring optical network is analyzed at bit rate 2.5 Gbps and 5 Gbps for various modulation formats such as NRZ rectangular, NRZ raised cosine, RZ soliton, RZ super Gaussian, RZ raised c...
The Problem of Universal Grammar with Multiple Languages: Arabic, English, Russian as Case Study
Every language has its characteristics and rules, though all languages share the same components like words, sentences, subject, verb, object and so on. Nevertheless, Chomsky suggested the theory of language acquisition...
Automated Menu Recommendation System Based on Past Preferences
Data mining plays an important role in ecommerce in today’s world. Time is critical when it comes to shopping as options are unlimited and making a choice can be tedious. This study presents an application of data mining...