Hayder Najm - Academia.edu (original) (raw)

Papers by Hayder Najm

Research paper thumbnail of Lightweight Image Encryption Using Chacha20 and Serpent Algorithm

Journal of Internet Services and Information Security, 2024

Data security is prominent today primarily due to the numerous applications of digital images in ... more Data security is prominent today primarily due to the numerous applications of digital images in the contemporary world. Innovations in lightweight encryption are being perceived as the solutions that would allow enhancing the levels of protection while incurring minimal impact on the size of the data and the speed of the processes. The lightweight encryption of images having lower complexities is a good choice in different suites, namely, in cloud computing systems and using social networks for communication. All users will not have to worry about their data being hacked when sharing the images. This paper presents a new lightweight image encryption technique that utilizes the ChaCha20 keys generator with the 16-round Serpent algorithm to provide a lightweight encryption process. The security analysis findings indicate that the suggested cipher is capable of withstanding both known and chosen plaintext attacks. Additionally, it exhibits a high degree of unpredictability, a significant level of security, and a strong sensitivity to key variations. The assessment of the encryption methods is done with the assistance of equipment through histogram analysis, entropy calculation, correlation analysis, mean squared error measurement, peak signal-to-noise ratio calculation, unified average change intensity assessment, normalized pixel difference rate analysis, and structural similarity index. As stated by experimental results, the proposed encryption method performs very well when adopted by various measuring instruments, the value of the information entropy equals to 7.98, which is nearly equivalent to the perfect value of 8. In addition, the value obtained for the normalized pixel difference rate is greater than 99.55%, with the unified average changing intensity equal to 30.11. As it has been mentioned, the decryption process can work very well.

Research paper thumbnail of Face Smile Detection and Cavernous Biometric Prediction using Perceptual User Interfaces (PUIs)

Face identification and biometric analytics is a modern domain of study and enormous algorithms i... more Face identification and biometric analytics is a modern domain of study and enormous algorithms in this aspect. Perceptual interface can be described as: highly immersive, multi-modal interfaces focused on normal human-to-human interactions, with the purpose of allowing users to communicate with software in a similar way to how they communicate with one another and the physical environment. It is nowadays quite effectual in face smile detection. Smile detection is a two-stage process. First you feel a face and then wait for a grin and in thousands of zones a motion detector splits the clip, Analyzing criteria like auto focus and facial flash level. When a human smile, the camera identifies a facial defect by identifying various parameters, It involves shutting your eyes, making your teeth transparent, folding your mouth, and lifting your lips. You should adjust the camera parameters to increase the sensitivity of the Smile automatic feature. When participants (with bangs, etc.) do not cover their faces, especially their eyes, authentic smile recognition is more successful. Helmets, masks or sunglasses can also be obstructed. For your subjects, you should have a wide and openmouthed smile. When the teeth are open and clear, the camera can even detect a smile better. The presented work focuses on analytics of face smile through Perceptual User Interfaces in biometric analytics for cumulative results.

Research paper thumbnail of A proposed hybrid cryptography algorithm based on GOST and salsa (20)

Security concepts are frequently used interchangeably. These concepts are interrelated and share ... more Security concepts are frequently used interchangeably. These concepts are interrelated and share similar objectives for the protection of privacy, credibility, and access to information; however, there are some slight differences between them. Such variations lie mostly in the subject matter approach, the approaches used, and the focus fields. With the intention of protecting data in contradiction of unauthorized or unintentional disclosure, cryptography is used during transit (electronic or physical) and when data is stored. In the course of the past few years, some block ciphers and stream ciphers have been proposed. These block ciphers take encryption method that uses Substitution-Permutation and Feistel network structure while stream ciphers choose a onetime method. GOST encryption is based on the confidentiality of the secret key. However, it leads to the same ciphertext being generated when the encryption program is used with the same key for the plain text. Reproduction of me...

Research paper thumbnail of Schema Matching Using Word-level Clustering for Integrating Universities’ Courses

2020 2nd Al-Noor International Conference for Science and Technology (NICST)

Schema matching is the process of determining the similarities among multiple schemas of database... more Schema matching is the process of determining the similarities among multiple schemas of databases or websites structure. Several matching approaches have been depicted in the literature. The most adequate and accurate approach is related to the textual analysis. In this approche, the schemas are being examined in terms of its text information. Various studies used textual-based matching by addressing the character-level string similarity. However, the character-level similarity would have some limitations regarding the words with similar characters but different meanings. Therefore, this study aims to propose a word-level similarity method based on term frequency and cosine similarity. Consequentially, a K-means clustering will utilize the proposed matching analysis to group the correspondences among the schemas. A dataset for universities’ courses is being used to test the proposed method. Experimental results showed that the proposed word-level similarity method had outperformed the character-level by obtaining 73% accuracy. This indicates the significance of using word-level similarity when using cluster-based schema matching.

Research paper thumbnail of Improved Approach for Identification of Real and Fake Smile using Chaos Theory and Principal Component Analysis

Journal of Southwest Jiaotong University

The smile detection approach is quite prominent with the face detection and thereby the enormous ... more The smile detection approach is quite prominent with the face detection and thereby the enormous implementations are prevalent so that the higher degree of accuracy can be achieved. The face smile detection is widely associated to have the forensic of faces of human beings so that the future predictions can be done. In chaos theory, the main strategy is to have the cavernous analytics on the single change and then to predict the actual faces in the analysis. In addition, the integration of Principal Component Analysis (PCA) is integrated to have the predictions with more accuracy. This work proposes to use the analytics on the parallel integration of PCA and chaos theory to enable the face smile and fake identifications to be made possible. The projected work is analyzed using assorted parameters and it has been found that the deep learning integration approach for chaos and PCA is quite important and performance aware in the multiple parameters with the different datasets in evalua...

Research paper thumbnail of An Effective Implementation of Face Recognition Using Deep Convolutional Network

Journal of Southwest Jiaotong University

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System

Int. J. Interact. Mob. Technol., 2021

The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of shari... more The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems and opportunities, thus paving the way for several exciting industries applications. In cryptography a range of main characteristics of chaotic systems such as non-linearity, initial condition sensitivity, and mixing properties are available. These characteristics provide an essential connection between cryptography and chaos. GOST block cipher is based on secret key secrecy. However, when the encryption process with the same key is used for plaintext, the same cipher text is created. Message replication can be easily detected by an adversary who is a bad link in every communication. In this paper, propose to use a 5d chaotic system combined with GOST block cipher to create a new secure Web of Things (WoT) cryptography system. The ...

Research paper thumbnail of Data Authentication for Web of Things (WoT) by Using Modified Secure Hash Algorithm-3 (SHA-3) and Salsa20 Algorithm

The development of the Web as a highly integrated user interface to real link things has brought ... more The development of the Web as a highly integrated user interface to real link things has brought many challenges and problems to study, which has led to a rapidly increasing area of research called the Web of things (WoT). Present Web of things (WoT) research is a trigger for the Internet of Things (IoT) growth, opening up opportunities to create ambient areas where people and things interact seamlessly via the Web. This proliferation created concerns among users about the increased usage of Web of Things (WoT) without ensuring that the data generated by its devices are maintained. Many ways to maintain authentication by using lightweight speed algorithms to encrypt and validate the relevant parameters. In the authentication of information, many algorithms have been developed to ensure that the data generated from a physical sensor to the user environment is authentic. These include SHA-1, SHA-2, SHA-3, etc. In Web of Things (WoT), it must be essential to ensure data validity and th...

Research paper thumbnail of 西 南 交 通 大 学 学 报 AN EFFECTIVE IMPLEMENTATION OF FACE RECOGNITION USING DEEP CONVOLUTIONAL NETWORK

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2019

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of Paper-A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System

The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of shari... more The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems and opportunities, thus paving the way for several exciting industries applications. In cryptography a range of main characteristics of chaotic systems such as non-linearity, initial condition sensitivity, and mixing properties are available. These characteristics provide an essential connection between cryptography and chaos. GOST is the Russian norm of encryption. GOST block cipher is based on secret key secrecy. However , when the encryption process with the same key is used for plaintext, the same cipher text is created. Message replication can be easily detected by an adversary who is a bad link in every communication. In this paper, we propose to use a 5d chaotic system combined with GOST block cipher to create a new secure Web of Things (WoT) cryptography system. GOST is a symmetric block cipher. It is the basis of most secure information systems in Russia. The 5D chaotic system was used to generate chaotic random keys that used in the GOST algorithm to provide security as a higher strength to increases randomly. The National Institute of Standards and Technology (NIST) designed a set of fifteen statistical tests and modifies key schedule as security operations.

Research paper thumbnail of IMPROVED APPROACH FOR IDENTIFICATION OF REAL AND FAKE SMILE USING CHAOS THEORY AND PRINCIPAL COMPONENT ANALYSIS

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2020

The smile detection approach is quite prominent with the face detection and thereby the enormous ... more The smile detection approach is quite prominent with the face detection and thereby the enormous implementations are prevalent so that the higher degree of accuracy can be achieved. The face smile detection is widely associated to have the forensic of faces of human beings so that the future predictions can be done. In chaos theory, the main strategy is to have the cavernous analytics on the single change and then to predict the actual faces in the analysis. In addition, the integration of Principal Component Analysis (PCA) is integrated to have the predictions with more accuracy. This work proposes to use the analytics on the parallel integration of PCA and chaos theory to enable the face smile and fake identifications to be made possible. The projected work is analyzed using assorted parameters and it has been found that the deep learning integration approach for chaos and PCA is quite important and performance aware in the multiple parameters with the different datasets in evaluations.

Research paper thumbnail of A proposed hybrid cryptography algorithm based on GOST and salsa (20

Periodicals of Engineering and Natural Sciences, 2020

Security concepts are frequently used interchangeably. These concepts are interrelated and share ... more Security concepts are frequently used interchangeably. These concepts are interrelated and share similar objectives for the protection of privacy, credibility, and access to information; however, there are some slight differences between them. Such variations lie mostly in the subject matter approach, the approaches used, and the focus fields. With the intention of protecting data in contradiction of unauthorized or unintentional disclosure, cryptography is used during transit (electronic or physical) and when data is stored. In the course of the past few years, some block ciphers and stream ciphers have been proposed. These block ciphers take encryption method that uses Substitution-Permutation and Feistel network structure while stream ciphers choose a onetime method. GOST encryption is based on the confidentiality of the secret key. However, it leads to the same ciphertext being generated when the encryption program is used with the same key for the plain text. Reproduction of messages can thus easily be identified by an opponent that is a weak link in any communication. In this paper, proposed a hybrid encryption method based on GOST block cipher and Salsa stream cipher to provide proper security with as high hardness randomly enhances the five standard tests and modifies key schedule as secure operations. The downside of the GOST algorithm is a simple key schedule so that in certain circumstances be the weak point of the method of cryptanalysis as related-key cryptanalysis. However, this resolved by the proposed method by passing the keys of GOST to Salsa stream to have the right combination and more robustness security. Its need for 2 256 probable keys to breaking keys that, because of its uncomfortable procedure in this situation, is to be not used brute force attack. Correspondingly, five standard tests successfully surpassed the randomness of a proposed method.

Research paper thumbnail of AN EFFECTIVE IMPLEMENTATION OF FACE RECOGNITION USING DEEP CONVOLUTIONAL NETWORK

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2019

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of Intelligent Internet of Everything (IOE) Data Collection for Health Care Monitor System

International Journal of Advanced Science and Technology, 2020

In developing countries, numerous regular lives of humans are affected because patients they're w... more In developing countries, numerous regular lives of humans are affected because patients they're weak and don't have money. Besides, in the clinic, the real-time parameter values are not calculated productively, as in hospitals. Generally, it becomes tough for hospitals to check patients' conditions frequently. Also, continuous observance of intensive care unit patients isn't doable. All machinery pieces are interrelated in the development of Internet technologies. Using advanced technology, we can make a lot for human lives efficient and straightforward. Several positions are located in the Internet of Everything (IOE). Smart house, bright city, intelligent parking, agriculture, and medicine. Like an intelligent world.Our proposed system is useful to manage these methods of things; the proposed system intended to use varied parameters such as temperature, ECG(Electrocardiogram), heartbeat, etc. in hospitals for calculation and observance. Raspberry Pi will record the results showed on an LCD(Liquid Crystal Display). Additionally, the results will be sent to the server by the GPRS(General Packet Radio Service) modem. Specialist (Doctor) will log in to a website and look at those results.Intelligent ofthe proposed system includes any oscillation in the case of a patient; the system sends a message to the doctor through a mail and a personal number.

Research paper thumbnail of Lightweight Image Encryption Using Chacha20 and Serpent Algorithm

Journal of Internet Services and Information Security, 2024

Data security is prominent today primarily due to the numerous applications of digital images in ... more Data security is prominent today primarily due to the numerous applications of digital images in the contemporary world. Innovations in lightweight encryption are being perceived as the solutions that would allow enhancing the levels of protection while incurring minimal impact on the size of the data and the speed of the processes. The lightweight encryption of images having lower complexities is a good choice in different suites, namely, in cloud computing systems and using social networks for communication. All users will not have to worry about their data being hacked when sharing the images. This paper presents a new lightweight image encryption technique that utilizes the ChaCha20 keys generator with the 16-round Serpent algorithm to provide a lightweight encryption process. The security analysis findings indicate that the suggested cipher is capable of withstanding both known and chosen plaintext attacks. Additionally, it exhibits a high degree of unpredictability, a significant level of security, and a strong sensitivity to key variations. The assessment of the encryption methods is done with the assistance of equipment through histogram analysis, entropy calculation, correlation analysis, mean squared error measurement, peak signal-to-noise ratio calculation, unified average change intensity assessment, normalized pixel difference rate analysis, and structural similarity index. As stated by experimental results, the proposed encryption method performs very well when adopted by various measuring instruments, the value of the information entropy equals to 7.98, which is nearly equivalent to the perfect value of 8. In addition, the value obtained for the normalized pixel difference rate is greater than 99.55%, with the unified average changing intensity equal to 30.11. As it has been mentioned, the decryption process can work very well.

Research paper thumbnail of Face Smile Detection and Cavernous Biometric Prediction using Perceptual User Interfaces (PUIs)

Face identification and biometric analytics is a modern domain of study and enormous algorithms i... more Face identification and biometric analytics is a modern domain of study and enormous algorithms in this aspect. Perceptual interface can be described as: highly immersive, multi-modal interfaces focused on normal human-to-human interactions, with the purpose of allowing users to communicate with software in a similar way to how they communicate with one another and the physical environment. It is nowadays quite effectual in face smile detection. Smile detection is a two-stage process. First you feel a face and then wait for a grin and in thousands of zones a motion detector splits the clip, Analyzing criteria like auto focus and facial flash level. When a human smile, the camera identifies a facial defect by identifying various parameters, It involves shutting your eyes, making your teeth transparent, folding your mouth, and lifting your lips. You should adjust the camera parameters to increase the sensitivity of the Smile automatic feature. When participants (with bangs, etc.) do not cover their faces, especially their eyes, authentic smile recognition is more successful. Helmets, masks or sunglasses can also be obstructed. For your subjects, you should have a wide and openmouthed smile. When the teeth are open and clear, the camera can even detect a smile better. The presented work focuses on analytics of face smile through Perceptual User Interfaces in biometric analytics for cumulative results.

Research paper thumbnail of A proposed hybrid cryptography algorithm based on GOST and salsa (20)

Security concepts are frequently used interchangeably. These concepts are interrelated and share ... more Security concepts are frequently used interchangeably. These concepts are interrelated and share similar objectives for the protection of privacy, credibility, and access to information; however, there are some slight differences between them. Such variations lie mostly in the subject matter approach, the approaches used, and the focus fields. With the intention of protecting data in contradiction of unauthorized or unintentional disclosure, cryptography is used during transit (electronic or physical) and when data is stored. In the course of the past few years, some block ciphers and stream ciphers have been proposed. These block ciphers take encryption method that uses Substitution-Permutation and Feistel network structure while stream ciphers choose a onetime method. GOST encryption is based on the confidentiality of the secret key. However, it leads to the same ciphertext being generated when the encryption program is used with the same key for the plain text. Reproduction of me...

Research paper thumbnail of Schema Matching Using Word-level Clustering for Integrating Universities’ Courses

2020 2nd Al-Noor International Conference for Science and Technology (NICST)

Schema matching is the process of determining the similarities among multiple schemas of database... more Schema matching is the process of determining the similarities among multiple schemas of databases or websites structure. Several matching approaches have been depicted in the literature. The most adequate and accurate approach is related to the textual analysis. In this approche, the schemas are being examined in terms of its text information. Various studies used textual-based matching by addressing the character-level string similarity. However, the character-level similarity would have some limitations regarding the words with similar characters but different meanings. Therefore, this study aims to propose a word-level similarity method based on term frequency and cosine similarity. Consequentially, a K-means clustering will utilize the proposed matching analysis to group the correspondences among the schemas. A dataset for universities’ courses is being used to test the proposed method. Experimental results showed that the proposed word-level similarity method had outperformed the character-level by obtaining 73% accuracy. This indicates the significance of using word-level similarity when using cluster-based schema matching.

Research paper thumbnail of Improved Approach for Identification of Real and Fake Smile using Chaos Theory and Principal Component Analysis

Journal of Southwest Jiaotong University

The smile detection approach is quite prominent with the face detection and thereby the enormous ... more The smile detection approach is quite prominent with the face detection and thereby the enormous implementations are prevalent so that the higher degree of accuracy can be achieved. The face smile detection is widely associated to have the forensic of faces of human beings so that the future predictions can be done. In chaos theory, the main strategy is to have the cavernous analytics on the single change and then to predict the actual faces in the analysis. In addition, the integration of Principal Component Analysis (PCA) is integrated to have the predictions with more accuracy. This work proposes to use the analytics on the parallel integration of PCA and chaos theory to enable the face smile and fake identifications to be made possible. The projected work is analyzed using assorted parameters and it has been found that the deep learning integration approach for chaos and PCA is quite important and performance aware in the multiple parameters with the different datasets in evalua...

Research paper thumbnail of An Effective Implementation of Face Recognition Using Deep Convolutional Network

Journal of Southwest Jiaotong University

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System

Int. J. Interact. Mob. Technol., 2021

The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of shari... more The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems and opportunities, thus paving the way for several exciting industries applications. In cryptography a range of main characteristics of chaotic systems such as non-linearity, initial condition sensitivity, and mixing properties are available. These characteristics provide an essential connection between cryptography and chaos. GOST block cipher is based on secret key secrecy. However, when the encryption process with the same key is used for plaintext, the same cipher text is created. Message replication can be easily detected by an adversary who is a bad link in every communication. In this paper, propose to use a 5d chaotic system combined with GOST block cipher to create a new secure Web of Things (WoT) cryptography system. The ...

Research paper thumbnail of Data Authentication for Web of Things (WoT) by Using Modified Secure Hash Algorithm-3 (SHA-3) and Salsa20 Algorithm

The development of the Web as a highly integrated user interface to real link things has brought ... more The development of the Web as a highly integrated user interface to real link things has brought many challenges and problems to study, which has led to a rapidly increasing area of research called the Web of things (WoT). Present Web of things (WoT) research is a trigger for the Internet of Things (IoT) growth, opening up opportunities to create ambient areas where people and things interact seamlessly via the Web. This proliferation created concerns among users about the increased usage of Web of Things (WoT) without ensuring that the data generated by its devices are maintained. Many ways to maintain authentication by using lightweight speed algorithms to encrypt and validate the relevant parameters. In the authentication of information, many algorithms have been developed to ensure that the data generated from a physical sensor to the user environment is authentic. These include SHA-1, SHA-2, SHA-3, etc. In Web of Things (WoT), it must be essential to ensure data validity and th...

Research paper thumbnail of 西 南 交 通 大 学 学 报 AN EFFECTIVE IMPLEMENTATION OF FACE RECOGNITION USING DEEP CONVOLUTIONAL NETWORK

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2019

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of Paper-A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System

The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of shari... more The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems and opportunities, thus paving the way for several exciting industries applications. In cryptography a range of main characteristics of chaotic systems such as non-linearity, initial condition sensitivity, and mixing properties are available. These characteristics provide an essential connection between cryptography and chaos. GOST is the Russian norm of encryption. GOST block cipher is based on secret key secrecy. However , when the encryption process with the same key is used for plaintext, the same cipher text is created. Message replication can be easily detected by an adversary who is a bad link in every communication. In this paper, we propose to use a 5d chaotic system combined with GOST block cipher to create a new secure Web of Things (WoT) cryptography system. GOST is a symmetric block cipher. It is the basis of most secure information systems in Russia. The 5D chaotic system was used to generate chaotic random keys that used in the GOST algorithm to provide security as a higher strength to increases randomly. The National Institute of Standards and Technology (NIST) designed a set of fifteen statistical tests and modifies key schedule as security operations.

Research paper thumbnail of IMPROVED APPROACH FOR IDENTIFICATION OF REAL AND FAKE SMILE USING CHAOS THEORY AND PRINCIPAL COMPONENT ANALYSIS

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2020

The smile detection approach is quite prominent with the face detection and thereby the enormous ... more The smile detection approach is quite prominent with the face detection and thereby the enormous implementations are prevalent so that the higher degree of accuracy can be achieved. The face smile detection is widely associated to have the forensic of faces of human beings so that the future predictions can be done. In chaos theory, the main strategy is to have the cavernous analytics on the single change and then to predict the actual faces in the analysis. In addition, the integration of Principal Component Analysis (PCA) is integrated to have the predictions with more accuracy. This work proposes to use the analytics on the parallel integration of PCA and chaos theory to enable the face smile and fake identifications to be made possible. The projected work is analyzed using assorted parameters and it has been found that the deep learning integration approach for chaos and PCA is quite important and performance aware in the multiple parameters with the different datasets in evaluations.

Research paper thumbnail of A proposed hybrid cryptography algorithm based on GOST and salsa (20

Periodicals of Engineering and Natural Sciences, 2020

Security concepts are frequently used interchangeably. These concepts are interrelated and share ... more Security concepts are frequently used interchangeably. These concepts are interrelated and share similar objectives for the protection of privacy, credibility, and access to information; however, there are some slight differences between them. Such variations lie mostly in the subject matter approach, the approaches used, and the focus fields. With the intention of protecting data in contradiction of unauthorized or unintentional disclosure, cryptography is used during transit (electronic or physical) and when data is stored. In the course of the past few years, some block ciphers and stream ciphers have been proposed. These block ciphers take encryption method that uses Substitution-Permutation and Feistel network structure while stream ciphers choose a onetime method. GOST encryption is based on the confidentiality of the secret key. However, it leads to the same ciphertext being generated when the encryption program is used with the same key for the plain text. Reproduction of messages can thus easily be identified by an opponent that is a weak link in any communication. In this paper, proposed a hybrid encryption method based on GOST block cipher and Salsa stream cipher to provide proper security with as high hardness randomly enhances the five standard tests and modifies key schedule as secure operations. The downside of the GOST algorithm is a simple key schedule so that in certain circumstances be the weak point of the method of cryptanalysis as related-key cryptanalysis. However, this resolved by the proposed method by passing the keys of GOST to Salsa stream to have the right combination and more robustness security. Its need for 2 256 probable keys to breaking keys that, because of its uncomfortable procedure in this situation, is to be not used brute force attack. Correspondingly, five standard tests successfully surpassed the randomness of a proposed method.

Research paper thumbnail of AN EFFECTIVE IMPLEMENTATION OF FACE RECOGNITION USING DEEP CONVOLUTIONAL NETWORK

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, 2019

Human Face Recognition for forensic investigations and e-governance is widely adopted so that the... more Human Face Recognition for forensic investigations and e-governance is widely adopted so that the specific face points can be trained and further investigations can be done. In this approach, the key points of human face with the dynamic features are extracted and trained in the deep neural network model so that the intrinsic aspects of the human face can be realized and further can be used for the criminal investigation or social analytics based applications. In this research manuscript, the usage of deep learning based convolutional network is integrated for the human face analytics and recognition for diversified applications. It is done to have the cavernous evaluation patterns in multiple domains for the knowledge discovery and predictive features of the human face identification domain.

Research paper thumbnail of Intelligent Internet of Everything (IOE) Data Collection for Health Care Monitor System

International Journal of Advanced Science and Technology, 2020

In developing countries, numerous regular lives of humans are affected because patients they're w... more In developing countries, numerous regular lives of humans are affected because patients they're weak and don't have money. Besides, in the clinic, the real-time parameter values are not calculated productively, as in hospitals. Generally, it becomes tough for hospitals to check patients' conditions frequently. Also, continuous observance of intensive care unit patients isn't doable. All machinery pieces are interrelated in the development of Internet technologies. Using advanced technology, we can make a lot for human lives efficient and straightforward. Several positions are located in the Internet of Everything (IOE). Smart house, bright city, intelligent parking, agriculture, and medicine. Like an intelligent world.Our proposed system is useful to manage these methods of things; the proposed system intended to use varied parameters such as temperature, ECG(Electrocardiogram), heartbeat, etc. in hospitals for calculation and observance. Raspberry Pi will record the results showed on an LCD(Liquid Crystal Display). Additionally, the results will be sent to the server by the GPRS(General Packet Radio Service) modem. Specialist (Doctor) will log in to a website and look at those results.Intelligent ofthe proposed system includes any oscillation in the case of a patient; the system sends a message to the doctor through a mail and a personal number.