{"title":"File Security using Image-based Encryption (FSUIE)","authors":"Mohammed Sekhi, M. Ilyas","doi":"10.1109/STCR55312.2022.10009103","DOIUrl":null,"url":null,"abstract":"The process of exchanging information via electronic communications is a sensitive matter in our time, and with the development of devices, technologies, and methods of analysis, the usual methods may be unsafe, so we always resort to developing them or perhaps new ideas. In this research, we will talk about a new method of encryption called (FSUIE) that depends on the image, where the way to work will be by comparing the bytes of characters with the bytes of the image and using the locations of these bytes as an encrypted text sent to the future, regardless of the length of this encrypted text. In addition to mentioning some algorithms other to compare them to how each works.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Smart Technologies, Communication and Robotics (STCR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STCR55312.2022.10009103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The process of exchanging information via electronic communications is a sensitive matter in our time, and with the development of devices, technologies, and methods of analysis, the usual methods may be unsafe, so we always resort to developing them or perhaps new ideas. In this research, we will talk about a new method of encryption called (FSUIE) that depends on the image, where the way to work will be by comparing the bytes of characters with the bytes of the image and using the locations of these bytes as an encrypted text sent to the future, regardless of the length of this encrypted text. In addition to mentioning some algorithms other to compare them to how each works.