A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

Abstract

Nowadays, after the significant development in the Internet, communication and information exchange around the world has become easier and faster than before. One may send an e-mail or perform money transaction (using a credit card) while being at home. The Internet users can also share resources (storage, memory, etc.) or invoke a method on a remote machine. All these activities require securing data while the data are sent through the global network. There are various methods for securing data on the internet and ensuring its privacy; one of these methods is data encryption. This technique is used to protect the data from hackers by scrambling these data into a non-readable form. In this paper, we propose a novel method for data encryption based on the transformation of a text message into a barcode image. In this paper, the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed.

Authors and Affiliations

Abusukhon Ahmad, Bilal Hawashin

Keywords

Related Articles

Software Security Requirements Gathering Instrument

Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured soft...

Tagging Urdu Sentences from English POS Taggers

Being a global language, English has attracted a majority of researchers and academia to work on several Natural Language Processing (NLP) applications. The rest of the languages are not focused as much as English. Part-...

Evaluating Predictive Algorithms using Receiver-Operative Characteristics for Coronary Illness among Diabetic Patients

The grouping of information is a typical method in Machine learning. Information mining assumes a crucial part to extract learning from vast databases from operational databases. In medicinal services Data mining is a cr...

Neutrosophic Relational Database Decomposition 

In this paper we present a method of decomposing a neutrosophic database relation with Neutrosophic attributes into basic relational form. Our objective is capable of manipulating incomplete as well as inconsistent infor...

 2D Satellite Image Registration Using Transform Based and Correlation Based Methods

 Image registration is the process of geometrically aligning one image to another image of the same scene taken from different viewpoints or by different sensors. It is a fundamental image processing technique and i...

Download PDF file
  • EP ID EP117592
  • DOI 10.14569/IJACSA.2015.061209
  • Views 104
  • Downloads 0

How To Cite

Abusukhon Ahmad, Bilal Hawashin (2015). A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm. International Journal of Advanced Computer Science & Applications, 6(12), 64-70. https://europub.co.uk/articles/-A-117592