{"title":"Pixel based method for Text to Image Encryption","authors":"K. Malathi, R. Kavitha, M. Liza","doi":"10.1109/ICECA49313.2020.9297478","DOIUrl":null,"url":null,"abstract":"Normally, the encryption and decryption is done only to convert the text into an encrypted form (i.e.) the confused form of text. In this type of method a hacker may easily hack the text using the public key or private key. So in this paper a new technique called Text to image encryption has been proposed. This will convert the plain text or information into an image format. That image will hide the encrypted text. If the user wants to view the text, first the image is divided into blocks. Each color component will be modified using the secret key. It will be difficult to the hackers to hack the information. This method can be used for large set of databases.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA49313.2020.9297478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Normally, the encryption and decryption is done only to convert the text into an encrypted form (i.e.) the confused form of text. In this type of method a hacker may easily hack the text using the public key or private key. So in this paper a new technique called Text to image encryption has been proposed. This will convert the plain text or information into an image format. That image will hide the encrypted text. If the user wants to view the text, first the image is divided into blocks. Each color component will be modified using the secret key. It will be difficult to the hackers to hack the information. This method can be used for large set of databases.