Majid Jawad - Academia.edu (original) (raw)

Papers by Majid Jawad

Research paper thumbnail of Performance Analysis of Least Significant Bit Based Watermarking Technique Under Various Types of Attacks

Journal of Physics: Conference Series

Digital information transferred through internet should be protection from unauthorized and attac... more Digital information transferred through internet should be protection from unauthorized and attack resource using one of the information security system method, one of these methods was digital watermarking was used in order to prevent information from various types of attack adversary since it satisfies all security system requirements (authentication, integrity and confident). Digital watermarking is used digital image for several purposes such as authentication, copyright, and many purposes. This paper we embedded (number of bits) MSB of watermark image in the (number of bits) LSB of cover image by proposed embedding algorithm, where the ratio of appearing information of the watermark in the watermarked image depends on a number bits embedded. Such that increasing the number bits increase the information display. The performance of the algorithm for watermarking and quality of reconstructed image have been measured in terms of MSE and PSNR. This paper produced performance analysi...

Research paper thumbnail of A Coverless video steganography: A Survey

2022 5th International Conference on Engineering Technology and its Applications (IICETA), May 31, 2022

Research paper thumbnail of Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

Baghdad Science Journal, Dec 1, 2022

Attacking a transferred data over a network is frequently happened millions time a day. To addres... more Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stegoobject is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Research paper thumbnail of A coverless image steganography based on robust image wavelet hashing

TELKOMNIKA (Telecommunication Computing Electronics and Control)

Since the concept of coverless information hiding was proposed, it has been greatly developed due... more Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.

Research paper thumbnail of Analytic Study for Constructing A Network Emergency System

A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts... more A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links, the union of which forms an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may be changed change rapidly and unpredictably. The changing state of the topology makes MANET ideal for emergency and rescue situation. Wireless ad-hoc networks will enable emergency services to continuously overview and act upon the actual status of the situation by retrieving and exchanging up-to-date detailed information between the rescue parties. Deployment of high-bandwidth, robust, self-organizing ad-hoc networks will enable quicker response to typical what/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses two proposal studies for constructing a net emergency system using ad hoc, with perspective, these studies take in consider to minimize the control overhead for route/location discovery by doing selective forwarding where only a few selected nodes in the network do the broadcasting, it is assumed that the mobile nodes can discern their relative positions with respect to other nodes in the range of communication. Using a real urban area being set for the emergency state, NS2 simulator has been used.

Research paper thumbnail of A new Approach for Applying (LSB) Method for Information Hiding

When using LSB technique on 8-bit images, more care needs to be taken, as 8-bit formats are not a... more When using LSB technique on 8-bit images, more care needs to be taken, as 8-bit formats are not as forgiving to data changes as 24-bit formats are. Care needs to take in the selection of the cover image, so the change to the data will not be invisible in the stego-image. When modifying the LSB bits in 8-bit images, the pointers to entries in the palette are changed. It is important to remember that a change of even one bit could mean the difference between a shade of red and a shade of blue. Such a change would be immediately noticeable on the displayed image, and is thus unacceptable. The suggested approach is modifying (LSB) to be used in 8-bits colored images which uses just less than 129 colors.

Research paper thumbnail of An intelligent Logo for Video Copyright Protection

Research paper thumbnail of Adaptive Message Authentication Protocol for Performance Improvement in ZigBee Wireless Sensor Network

ZigBee is used as a low power and low rate wireless sensor network. Many applications utilize it ... more ZigBee is used as a low power and low rate wireless sensor network. Many applications utilize it for data transfer. It provides some security options, including message authentication, message encryption and defense against replay attack. The security algorithms used in the ZigBee are run for each packet transfer when the security mode is on. This study tested the impact of message authentication over the network performance in terms of the throughput and data packet delivery ratio. The message authentication leads to performance degradation for the network. The blocks of the message are encrypted by using Advanced Encryption Standard (AES) algorithm for authenticating in CBC-MAC algorithm. The performance of the network is improved over the original state when AES algorithm is replaced by MKP-AES algorithm and DMAC algorithm is used to parallelize the authentication. MKP-AES is tested within two and three secret keys. The network is simulated using NS-2 to measure the performance improvement.

Research paper thumbnail of Survey Data Provenance Based on Applications

Research paper thumbnail of Two Levels of Security for Protection of Images Copyright

Lecture Notes in Networks and Systems, 2022

Research paper thumbnail of Binary Image Encryption Based on Chaotic and DNA Encoding

Lecture Notes in Networks and Systems, 2021

This paper proposed method for encrypting images depending on the chaotic system and the DNA codi... more This paper proposed method for encrypting images depending on the chaotic system and the DNA coding. The encrypting operation is done with several procedures. In the first procedure, the image is divided into non-overlapped blocks of n × n pixels. In the second procedure, the divide blocks are scrambled according to the desired key. In the third procedure, the quadratic chaotic system is used for generating a mask in order to scramble the pixels of the scrambled blocks. In the final procedure, the encrypting process based on DNA rules is used to encoding the scrambled image. Also, the decryption operation is done with several procedures. In the first procedure, the encrypted image is decrypted based on DNA rules. In the second procedure, the pixels of scrambled blocks are descrambled via quadratic chaotic system. Finally, the scrambled block is descrambled in order to get the decrypted image. More details about the proposed method are shown in the sections of the paper. The experimental results show that the proposed method satisfied the requirements of encryption.

Research paper thumbnail of Data Provenance Survey Based On It ' s Applications

Data provenance is defined as the origin and process history of a derived data item, which is bec... more Data provenance is defined as the origin and process history of a derived data item, which is becoming increasingly important for scientific research work. Although provenance can be very valuable for applications, research on data provenance is on its beginning and there is still a series of work that needs to be done. In this paper, some categories, which are provenance granularity, data granularity, data status, provenance computing, semantics of provenance, provenance storage and applications, are proposed to classify and analyze present provenance techniques. In this work we introduce a provenance classification for different applications based on proposed categories, to help the researchers in this field to understand the existing problems and the current challenges and how to enable the current techniques for solving these challenges.

Research paper thumbnail of Iris Recognition System Based on Lifting Wavelet

Cognitive Informatics and Soft Computing, 2020

At present, the need for a precise biometric identification system that provides reliable identif... more At present, the need for a precise biometric identification system that provides reliable identification and individual verification has rapidly increased. Biometric recognition system based on iris is a reliable human authentication in biometric technology. This paper proposed a new iris system using on lifting wavelet transform to recognize persons using low-quality iris images. At first, the iris area is localized. Then, it converted to the rectangular area. For discrimination purpose, a set of features are determined from the lifting wavelet subbands, where the iris area is analyzed to three levels. Also, the new method depends on using quantizing the two subbands (LH3 and HL3) and the average values for the two high-pass filters areas (HH1, HH2) to build the iris code. CASIA V1 dataset of iris images is used to measure the performance of proposed method. The test results indicated that the new method gives good identification rates (i.e., 98.46%) and verification rates (i.e., 100%) for CASIA V1 dataset.

Research paper thumbnail of Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES

Baghdad Science Journal, 2021

Image is an important digital information that used in many internet of things (IoT) applications... more Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Research paper thumbnail of Video Summarization for Copyright Protection

Journal of Physics: Conference Series, 2020

Nowadays, a summarization of videos for copyright application is an interested research area in c... more Nowadays, a summarization of videos for copyright application is an interested research area in computer vision. Key frames extraction is crucial phase in video summarization. This work proposed a method for key frames extraction. The method consists of two operations for covering the content of the whole video sequence. Firstly, a set of candidates key frames are extracted based on adaptive thresholding of difference of histogram of adjacent frames of video data. Secondly, the extraction of a final key frames is done depending on computing Euclidian distance between two adjacent frames in candidates key frames set. The proposed method was tested with a set of standard and online television videos. The experimental results show the efficiency of the proposed system.

Research paper thumbnail of Copyright Protection for Digital Image by Watermarking Technique

Journal of Information Processing Systems, 2017

Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audi... more Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

Research paper thumbnail of Watermarking Robust Against Dropping Frame

Recently, digital contents are copied easily. So digital watermark technique which aims to copyri... more Recently, digital contents are copied easily. So digital watermark technique which aims to copyright protection of digital contents becomes important. There are several watermarking methods have been proposed in this area, but this watermarking methods must be robust against geometric attacks, such as rotation, cropping, frame dropping. So, robustness against geometric attacks remains one of the most difficult areas of watermark research, not only for video, but also for still images. In this paper, we proposed a method for embedding digital watermark in video, by dividing the watermark into Blocks according to the number of scenes within video, then we embedded any block of watermark in the frames of scenes. After embedding operations, we examined the robustness of the proposed method against frame dropping, by dropping several frames from watermarked video arbitrarily. After extraction operation, and by using PSNR we found that there is no difference between the embedded and extracted watermark.

Research paper thumbnail of Enhancing of coverless image steganography capacity based on image block features

TELKOMNIKA Telecommunication Computing Electronics and Control, Nov 30, 2023

The idea of coverless information hiding has seen a great deal of development since it was initia... more The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools. However, the capacity for general coverless information hiding methods to conceal information is limited, as well as no previous methods worked at the other requirements such as robustness. In this paper, a coverless image steganography (CIS) method for increasing capacity is proposed while retaining the robustness. The proposed method consists of several steps. Firstly, the secret data is segmented into segments of the length. Secondly, a suitable image that has features similar to the secret message is selected and divided into non-overlapping blocks. Thirdly, these blocks are transformed into the frequency domain by applying discreet wavelet transform (DWT). Fourthly, building a hash sequence table using a suggested hashing algorithm. Fifthly, to reduce search time an indexing table is built based on the generated hash sequence. Sixthly, match each segment with the generated hash sequences and save the auxiliary information for each matched segment in the image in a file. Lastly, send the stego image and the auxiliary information file to the receiver. The experimental results show that the CIS method produces high capacity compared with previous CIS methods.

Research paper thumbnail of Encrypting of Text Based on Chaotic Map

JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences

Background: Due to the internet's recent rapid expansion, security ha... more Background: Due to the internet's recent rapid expansion, security has become a crucial issue when transmitting digital data via unsecure channels. This can be applied by employing dependable encryption methods. This research brought forward a text encryption system order to create safe databases. Materials and Methods: The research uses a chaotic map based on a logistic map Due to its widespread application in scientific research. Several processes are used to carry out the encryption activity. Firstly, the text is formatted in 2D matrix of numbers converted into vector. Secondly, to create a sequence for using it in the encryption process, the chaotic system is employed. Thirdly, sorting the generated vector in order to scramble the text values based on it. The final step involves encoding the scrambled text using a mathematical operation. Also, there are many steps used in the decryption process. In the first step, the same mathematical techniq...

Research paper thumbnail of Proposed New Watermarking Approach for Vector Image

Research paper thumbnail of Performance Analysis of Least Significant Bit Based Watermarking Technique Under Various Types of Attacks

Journal of Physics: Conference Series

Digital information transferred through internet should be protection from unauthorized and attac... more Digital information transferred through internet should be protection from unauthorized and attack resource using one of the information security system method, one of these methods was digital watermarking was used in order to prevent information from various types of attack adversary since it satisfies all security system requirements (authentication, integrity and confident). Digital watermarking is used digital image for several purposes such as authentication, copyright, and many purposes. This paper we embedded (number of bits) MSB of watermark image in the (number of bits) LSB of cover image by proposed embedding algorithm, where the ratio of appearing information of the watermark in the watermarked image depends on a number bits embedded. Such that increasing the number bits increase the information display. The performance of the algorithm for watermarking and quality of reconstructed image have been measured in terms of MSE and PSNR. This paper produced performance analysi...

Research paper thumbnail of A Coverless video steganography: A Survey

2022 5th International Conference on Engineering Technology and its Applications (IICETA), May 31, 2022

Research paper thumbnail of Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

Baghdad Science Journal, Dec 1, 2022

Attacking a transferred data over a network is frequently happened millions time a day. To addres... more Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stegoobject is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Research paper thumbnail of A coverless image steganography based on robust image wavelet hashing

TELKOMNIKA (Telecommunication Computing Electronics and Control)

Since the concept of coverless information hiding was proposed, it has been greatly developed due... more Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.

Research paper thumbnail of Analytic Study for Constructing A Network Emergency System

A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts... more A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links, the union of which forms an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may be changed change rapidly and unpredictably. The changing state of the topology makes MANET ideal for emergency and rescue situation. Wireless ad-hoc networks will enable emergency services to continuously overview and act upon the actual status of the situation by retrieving and exchanging up-to-date detailed information between the rescue parties. Deployment of high-bandwidth, robust, self-organizing ad-hoc networks will enable quicker response to typical what/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses two proposal studies for constructing a net emergency system using ad hoc, with perspective, these studies take in consider to minimize the control overhead for route/location discovery by doing selective forwarding where only a few selected nodes in the network do the broadcasting, it is assumed that the mobile nodes can discern their relative positions with respect to other nodes in the range of communication. Using a real urban area being set for the emergency state, NS2 simulator has been used.

Research paper thumbnail of A new Approach for Applying (LSB) Method for Information Hiding

When using LSB technique on 8-bit images, more care needs to be taken, as 8-bit formats are not a... more When using LSB technique on 8-bit images, more care needs to be taken, as 8-bit formats are not as forgiving to data changes as 24-bit formats are. Care needs to take in the selection of the cover image, so the change to the data will not be invisible in the stego-image. When modifying the LSB bits in 8-bit images, the pointers to entries in the palette are changed. It is important to remember that a change of even one bit could mean the difference between a shade of red and a shade of blue. Such a change would be immediately noticeable on the displayed image, and is thus unacceptable. The suggested approach is modifying (LSB) to be used in 8-bits colored images which uses just less than 129 colors.

Research paper thumbnail of An intelligent Logo for Video Copyright Protection

Research paper thumbnail of Adaptive Message Authentication Protocol for Performance Improvement in ZigBee Wireless Sensor Network

ZigBee is used as a low power and low rate wireless sensor network. Many applications utilize it ... more ZigBee is used as a low power and low rate wireless sensor network. Many applications utilize it for data transfer. It provides some security options, including message authentication, message encryption and defense against replay attack. The security algorithms used in the ZigBee are run for each packet transfer when the security mode is on. This study tested the impact of message authentication over the network performance in terms of the throughput and data packet delivery ratio. The message authentication leads to performance degradation for the network. The blocks of the message are encrypted by using Advanced Encryption Standard (AES) algorithm for authenticating in CBC-MAC algorithm. The performance of the network is improved over the original state when AES algorithm is replaced by MKP-AES algorithm and DMAC algorithm is used to parallelize the authentication. MKP-AES is tested within two and three secret keys. The network is simulated using NS-2 to measure the performance improvement.

Research paper thumbnail of Survey Data Provenance Based on Applications

Research paper thumbnail of Two Levels of Security for Protection of Images Copyright

Lecture Notes in Networks and Systems, 2022

Research paper thumbnail of Binary Image Encryption Based on Chaotic and DNA Encoding

Lecture Notes in Networks and Systems, 2021

This paper proposed method for encrypting images depending on the chaotic system and the DNA codi... more This paper proposed method for encrypting images depending on the chaotic system and the DNA coding. The encrypting operation is done with several procedures. In the first procedure, the image is divided into non-overlapped blocks of n × n pixels. In the second procedure, the divide blocks are scrambled according to the desired key. In the third procedure, the quadratic chaotic system is used for generating a mask in order to scramble the pixels of the scrambled blocks. In the final procedure, the encrypting process based on DNA rules is used to encoding the scrambled image. Also, the decryption operation is done with several procedures. In the first procedure, the encrypted image is decrypted based on DNA rules. In the second procedure, the pixels of scrambled blocks are descrambled via quadratic chaotic system. Finally, the scrambled block is descrambled in order to get the decrypted image. More details about the proposed method are shown in the sections of the paper. The experimental results show that the proposed method satisfied the requirements of encryption.

Research paper thumbnail of Data Provenance Survey Based On It ' s Applications

Data provenance is defined as the origin and process history of a derived data item, which is bec... more Data provenance is defined as the origin and process history of a derived data item, which is becoming increasingly important for scientific research work. Although provenance can be very valuable for applications, research on data provenance is on its beginning and there is still a series of work that needs to be done. In this paper, some categories, which are provenance granularity, data granularity, data status, provenance computing, semantics of provenance, provenance storage and applications, are proposed to classify and analyze present provenance techniques. In this work we introduce a provenance classification for different applications based on proposed categories, to help the researchers in this field to understand the existing problems and the current challenges and how to enable the current techniques for solving these challenges.

Research paper thumbnail of Iris Recognition System Based on Lifting Wavelet

Cognitive Informatics and Soft Computing, 2020

At present, the need for a precise biometric identification system that provides reliable identif... more At present, the need for a precise biometric identification system that provides reliable identification and individual verification has rapidly increased. Biometric recognition system based on iris is a reliable human authentication in biometric technology. This paper proposed a new iris system using on lifting wavelet transform to recognize persons using low-quality iris images. At first, the iris area is localized. Then, it converted to the rectangular area. For discrimination purpose, a set of features are determined from the lifting wavelet subbands, where the iris area is analyzed to three levels. Also, the new method depends on using quantizing the two subbands (LH3 and HL3) and the average values for the two high-pass filters areas (HH1, HH2) to build the iris code. CASIA V1 dataset of iris images is used to measure the performance of proposed method. The test results indicated that the new method gives good identification rates (i.e., 98.46%) and verification rates (i.e., 100%) for CASIA V1 dataset.

Research paper thumbnail of Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES

Baghdad Science Journal, 2021

Image is an important digital information that used in many internet of things (IoT) applications... more Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Research paper thumbnail of Video Summarization for Copyright Protection

Journal of Physics: Conference Series, 2020

Nowadays, a summarization of videos for copyright application is an interested research area in c... more Nowadays, a summarization of videos for copyright application is an interested research area in computer vision. Key frames extraction is crucial phase in video summarization. This work proposed a method for key frames extraction. The method consists of two operations for covering the content of the whole video sequence. Firstly, a set of candidates key frames are extracted based on adaptive thresholding of difference of histogram of adjacent frames of video data. Secondly, the extraction of a final key frames is done depending on computing Euclidian distance between two adjacent frames in candidates key frames set. The proposed method was tested with a set of standard and online television videos. The experimental results show the efficiency of the proposed system.

Research paper thumbnail of Copyright Protection for Digital Image by Watermarking Technique

Journal of Information Processing Systems, 2017

Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audi... more Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

Research paper thumbnail of Watermarking Robust Against Dropping Frame

Recently, digital contents are copied easily. So digital watermark technique which aims to copyri... more Recently, digital contents are copied easily. So digital watermark technique which aims to copyright protection of digital contents becomes important. There are several watermarking methods have been proposed in this area, but this watermarking methods must be robust against geometric attacks, such as rotation, cropping, frame dropping. So, robustness against geometric attacks remains one of the most difficult areas of watermark research, not only for video, but also for still images. In this paper, we proposed a method for embedding digital watermark in video, by dividing the watermark into Blocks according to the number of scenes within video, then we embedded any block of watermark in the frames of scenes. After embedding operations, we examined the robustness of the proposed method against frame dropping, by dropping several frames from watermarked video arbitrarily. After extraction operation, and by using PSNR we found that there is no difference between the embedded and extracted watermark.

Research paper thumbnail of Enhancing of coverless image steganography capacity based on image block features

TELKOMNIKA Telecommunication Computing Electronics and Control, Nov 30, 2023

The idea of coverless information hiding has seen a great deal of development since it was initia... more The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools. However, the capacity for general coverless information hiding methods to conceal information is limited, as well as no previous methods worked at the other requirements such as robustness. In this paper, a coverless image steganography (CIS) method for increasing capacity is proposed while retaining the robustness. The proposed method consists of several steps. Firstly, the secret data is segmented into segments of the length. Secondly, a suitable image that has features similar to the secret message is selected and divided into non-overlapping blocks. Thirdly, these blocks are transformed into the frequency domain by applying discreet wavelet transform (DWT). Fourthly, building a hash sequence table using a suggested hashing algorithm. Fifthly, to reduce search time an indexing table is built based on the generated hash sequence. Sixthly, match each segment with the generated hash sequences and save the auxiliary information for each matched segment in the image in a file. Lastly, send the stego image and the auxiliary information file to the receiver. The experimental results show that the CIS method produces high capacity compared with previous CIS methods.

Research paper thumbnail of Encrypting of Text Based on Chaotic Map

JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences

Background: Due to the internet's recent rapid expansion, security ha... more Background: Due to the internet's recent rapid expansion, security has become a crucial issue when transmitting digital data via unsecure channels. This can be applied by employing dependable encryption methods. This research brought forward a text encryption system order to create safe databases. Materials and Methods: The research uses a chaotic map based on a logistic map Due to its widespread application in scientific research. Several processes are used to carry out the encryption activity. Firstly, the text is formatted in 2D matrix of numbers converted into vector. Secondly, to create a sequence for using it in the encryption process, the chaotic system is employed. Thirdly, sorting the generated vector in order to scramble the text values based on it. The final step involves encoding the scrambled text using a mathematical operation. Also, there are many steps used in the decryption process. In the first step, the same mathematical techniq...

Research paper thumbnail of Proposed New Watermarking Approach for Vector Image