Mustafa Hassani - Academia.edu (original) (raw)

Uploads

Papers by Mustafa Hassani

Research paper thumbnail of Robust Password Encryption Technique with an Extra Security Layer

Iraqi journal of science, Mar 30, 2023

Research paper thumbnail of Development of playfair cryptosystem based on generation a multi-dimensional key matrix

Bulletin of Electrical Engineering and Informatics

Playfair is considered as one of the classical encryption symmetric methods, it has a limitation ... more Playfair is considered as one of the classical encryption symmetric methods, it has a limitation of using just 5×5 matrix, which means only 25 English letters could be represented. In this work, a 2D and 3D method is adopted as an expanded matrix that encompass the overall American standard code for information interchange (ASCII) codes in a permuted manner for all symbols of any language. Any sort of the multi-dimensional matrix will enhance the security by increasing the complexity on the attacker to try 256! patterns of keys probabilities instead of 25!. The key-matrix is generated from the chaotic maps for some control parameters as patterns of non-repeating random numbers from 0 to 255 equivalent to their ASCII code values. The security of the proposed method not rely only on the number of key probabilities, but exceed that to: matrix dimensionality, encryption/decryption algorithms, initial chaotic parameters, and key-matrix values permutation. The efficiency of the proposed c...

Research paper thumbnail of Underwater image copyright protection using robust watermarking technique

Indonesian Journal of Electrical Engineering and Computer Science

It became possible to send and reformat underwater images for copyright theft due to the rapid ad... more It became possible to send and reformat underwater images for copyright theft due to the rapid advancement of computer networks and image forgery tools. Acquiring underwater images is dangerous and requires much efforts, expensive imaging equipment, and professional photographers. Therefore, there is an urgent need to develop copyright protection methods to ensure that property rights are not lost. This paper presents a robust watermarking technique that ensures proof of ownership for underwater images, preventing unauthorized individuals from claiming ownership. The suggested watermarking technique's main contribution depends on using the Hough transform in order to find appropriate regions to hide the watermark information within the underwater images. The Hough transform is useful for identifying areas of difficult texture that can be used as a host for watermark information with minimal distortion. Also, the Twofish algorithm has been used to encrypt the watermark informatio...

Research paper thumbnail of Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution

Iraqi journal of science, Aug 31, 2022

Research paper thumbnail of Authentication and Integrity of E-documents based on Zero-Watermarking Method

Webology, 2022

During the last period, due increase the use of e-government applications and the health conditio... more During the last period, due increase the use of e-government applications and the health conditions that occurred as a result of the spread of the Corona virus, the using of e-documents has become increasingly common. Therefore, there was an urgent need to ensure the authenticity of the source and integrity of the e-documents and that they are free from forgery and manipulation. In this paper, the zero-watermarking method has been proposed in order to achieve the authentication and integrity of e-documents and to determine the regions which tampered. The main idea is based on segment the e-documents into small square areas with 8×8 and then generate the watermark information by computing the eigenvalues and eigenvectors. The generated watermark is insert into the e-documents with a specific relationship among regions. The experimental results prove the efficiency and effectiveness of the proposed method in detecting areas that have been tampered by various types of attacks. In addit...

Research paper thumbnail of Real Time Mobile Cloud Audio Reading System for Blind Persons

Webology, 2022

According to the World Health Organization there are approximately 285 million blind people aroun... more According to the World Health Organization there are approximately 285 million blind people around the world. These people are faced challenges when reading a book. This paper aims to design and implementation new real time mobile cloud audio reading system for blind persons. The proposed methodology consists of following steps: In Client Side, firstly, capture image of text by camera. Secondly, check the page localization. Thirdly, send image to server. In Cloud Side (Server Side), firstly, apply the modify EAST algorithm on received image to text detection. Secondly, apply OCR algorithm to extract text from image. Thirdly, apply post-processing step to correct the in corrected text. Finally, return text to client side to speak it using text-to-speech algorithm.

Research paper thumbnail of Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques

International Journal of Interactive Mobile Technologies (iJIM), 2019

The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the pr... more The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the process of trying to steal user information over the Internet by claiming they are a trusted entity and thus access and steal the victim's data (user name, password and credit card details). Consequently, the need for mobile phishing detection system has become an urgent need. And this is what we are attempting to introduce in this paper, where we introduce a system to detect phishing websites on Android phones. That predicts and prevents phishing websites from deceiving users, utilizing data mining techniques to predict whether a website is phishing or not, relying on a set of factors (URL based features, HTML based features and Domain based features). The results show system effectiveness in predicting phishing websites with 97% as prediction accuracy.

Research paper thumbnail of Multi-Layers Of Data Security System :, Encrypted Image In Image Steganography

المجلة العراقية لتكنولوجيا المعلومات, 2015

Research paper thumbnail of Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix

International Journal of Computer Applications, 2016

The rapid development in internet technologies and applications have led to great increase in the... more The rapid development in internet technologies and applications have led to great increase in the amount of information sent and received electronically. Transmitting information on networks have become insecure because of new threats continue to evolve. This research aims to provide an efficient technique with highly protection degree of secret images being transmitted "in a meaningless form" over a communication channel through the use of chaotic maps by taking its advantages over other methods of encryption. Chaotic based encryption algorithm is employed at the present time because of its best security and good performance according to the random sequences that are generated from nonlinear system in a high speed calculations. The obtained results from the experimental tests proved that the proposed encryption algorithm is a powerful and efficient technique according to the higher (Entropy ≤ 8) and (Correlation ≤ 1) with perfect reconstruction of the decryption image.

Research paper thumbnail of Design A Text-Prompt Speaker Recognition System Using LPC-Derived Features

Humans are integrated closer to computers every day, and computers are taking over many services ... more Humans are integrated closer to computers every day, and computers are taking over many services that used to be based on face-to-face contact between humans. This has prompted an active development in the field of biometric systems. The use of biometric information has been known widely for both person identification and security applications. The paper is concerned with the use of speaker features for protection against unauthorized access. A speaker recognition system for 6304 speech samples is presented that relies on LPC-derived features. A vocabulary of 46 speech samples is built for 10 speakers, where each authorized person is asked to utter every sample 10 times. Two different modes are considered in identifying individuals according to their speech samples. In the closed-set speaker identification, it is found that all tested LPC-derived features outperform the raw LPC coefficients and 84% to 97% identification rates are achieved. Applying the preprocessing steps to the spe...

Research paper thumbnail of Fingerprint Identification Technique Based on Wavelet-Bands Selection Features (WBSF)

ABSTRACT The paper is concerned with the use of fingerprint (FP)features for protection against u... more ABSTRACT The paper is concerned with the use of fingerprint (FP)features for protection against unauthorized access. Wavelet features for both closed and open-set FP recognition are studied here to verify persons' identity. Fingerprints of 49 persons (32-authorized and 17-unauthorized) were taken as testing data. Each authorized person is asked to give 10-instances of his right forefinger print. In the closed-set FP recognition, the obtained recognition rates are below 90% due to the imperfections in the FP images that negatively affect the recognition rate. Preprocessing operations such as: noise-removal, segmentation, normalization and binarization are considered to improve the resulting recognition rates. A method that relies on a new selection process for wavelet decomposition bands is proposed, which enhance the recognition rates further to get about 100% in some favorable conditions. The results have shown that the wavelet descriptors using the proposed Wavelet-Bands Selection Features (WBSF) are efficient representation that can provide reliable recognition for large input variability. The open-set FP verification mode is also presented for 290 trials from 29 persons, where the obtained verification rates are greater than 97% for both Euclidean and city-block distance measures.

Research paper thumbnail of Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hypermobility symptoms in the primary health care – a retrospective observation study

Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hyp... more Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hypermobility symptoms in the primary health care – a retrospective observation study

Research paper thumbnail of Robust Password Encryption Technique with an Extra Security Layer

Iraqi journal of science, Mar 30, 2023

Research paper thumbnail of Development of playfair cryptosystem based on generation a multi-dimensional key matrix

Bulletin of Electrical Engineering and Informatics

Playfair is considered as one of the classical encryption symmetric methods, it has a limitation ... more Playfair is considered as one of the classical encryption symmetric methods, it has a limitation of using just 5×5 matrix, which means only 25 English letters could be represented. In this work, a 2D and 3D method is adopted as an expanded matrix that encompass the overall American standard code for information interchange (ASCII) codes in a permuted manner for all symbols of any language. Any sort of the multi-dimensional matrix will enhance the security by increasing the complexity on the attacker to try 256! patterns of keys probabilities instead of 25!. The key-matrix is generated from the chaotic maps for some control parameters as patterns of non-repeating random numbers from 0 to 255 equivalent to their ASCII code values. The security of the proposed method not rely only on the number of key probabilities, but exceed that to: matrix dimensionality, encryption/decryption algorithms, initial chaotic parameters, and key-matrix values permutation. The efficiency of the proposed c...

Research paper thumbnail of Underwater image copyright protection using robust watermarking technique

Indonesian Journal of Electrical Engineering and Computer Science

It became possible to send and reformat underwater images for copyright theft due to the rapid ad... more It became possible to send and reformat underwater images for copyright theft due to the rapid advancement of computer networks and image forgery tools. Acquiring underwater images is dangerous and requires much efforts, expensive imaging equipment, and professional photographers. Therefore, there is an urgent need to develop copyright protection methods to ensure that property rights are not lost. This paper presents a robust watermarking technique that ensures proof of ownership for underwater images, preventing unauthorized individuals from claiming ownership. The suggested watermarking technique's main contribution depends on using the Hough transform in order to find appropriate regions to hide the watermark information within the underwater images. The Hough transform is useful for identifying areas of difficult texture that can be used as a host for watermark information with minimal distortion. Also, the Twofish algorithm has been used to encrypt the watermark informatio...

Research paper thumbnail of Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution

Iraqi journal of science, Aug 31, 2022

Research paper thumbnail of Authentication and Integrity of E-documents based on Zero-Watermarking Method

Webology, 2022

During the last period, due increase the use of e-government applications and the health conditio... more During the last period, due increase the use of e-government applications and the health conditions that occurred as a result of the spread of the Corona virus, the using of e-documents has become increasingly common. Therefore, there was an urgent need to ensure the authenticity of the source and integrity of the e-documents and that they are free from forgery and manipulation. In this paper, the zero-watermarking method has been proposed in order to achieve the authentication and integrity of e-documents and to determine the regions which tampered. The main idea is based on segment the e-documents into small square areas with 8×8 and then generate the watermark information by computing the eigenvalues and eigenvectors. The generated watermark is insert into the e-documents with a specific relationship among regions. The experimental results prove the efficiency and effectiveness of the proposed method in detecting areas that have been tampered by various types of attacks. In addit...

Research paper thumbnail of Real Time Mobile Cloud Audio Reading System for Blind Persons

Webology, 2022

According to the World Health Organization there are approximately 285 million blind people aroun... more According to the World Health Organization there are approximately 285 million blind people around the world. These people are faced challenges when reading a book. This paper aims to design and implementation new real time mobile cloud audio reading system for blind persons. The proposed methodology consists of following steps: In Client Side, firstly, capture image of text by camera. Secondly, check the page localization. Thirdly, send image to server. In Cloud Side (Server Side), firstly, apply the modify EAST algorithm on received image to text detection. Secondly, apply OCR algorithm to extract text from image. Thirdly, apply post-processing step to correct the in corrected text. Finally, return text to client side to speak it using text-to-speech algorithm.

Research paper thumbnail of Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques

International Journal of Interactive Mobile Technologies (iJIM), 2019

The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the pr... more The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the process of trying to steal user information over the Internet by claiming they are a trusted entity and thus access and steal the victim's data (user name, password and credit card details). Consequently, the need for mobile phishing detection system has become an urgent need. And this is what we are attempting to introduce in this paper, where we introduce a system to detect phishing websites on Android phones. That predicts and prevents phishing websites from deceiving users, utilizing data mining techniques to predict whether a website is phishing or not, relying on a set of factors (URL based features, HTML based features and Domain based features). The results show system effectiveness in predicting phishing websites with 97% as prediction accuracy.

Research paper thumbnail of Multi-Layers Of Data Security System :, Encrypted Image In Image Steganography

المجلة العراقية لتكنولوجيا المعلومات, 2015

Research paper thumbnail of Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix

International Journal of Computer Applications, 2016

The rapid development in internet technologies and applications have led to great increase in the... more The rapid development in internet technologies and applications have led to great increase in the amount of information sent and received electronically. Transmitting information on networks have become insecure because of new threats continue to evolve. This research aims to provide an efficient technique with highly protection degree of secret images being transmitted "in a meaningless form" over a communication channel through the use of chaotic maps by taking its advantages over other methods of encryption. Chaotic based encryption algorithm is employed at the present time because of its best security and good performance according to the random sequences that are generated from nonlinear system in a high speed calculations. The obtained results from the experimental tests proved that the proposed encryption algorithm is a powerful and efficient technique according to the higher (Entropy ≤ 8) and (Correlation ≤ 1) with perfect reconstruction of the decryption image.

Research paper thumbnail of Design A Text-Prompt Speaker Recognition System Using LPC-Derived Features

Humans are integrated closer to computers every day, and computers are taking over many services ... more Humans are integrated closer to computers every day, and computers are taking over many services that used to be based on face-to-face contact between humans. This has prompted an active development in the field of biometric systems. The use of biometric information has been known widely for both person identification and security applications. The paper is concerned with the use of speaker features for protection against unauthorized access. A speaker recognition system for 6304 speech samples is presented that relies on LPC-derived features. A vocabulary of 46 speech samples is built for 10 speakers, where each authorized person is asked to utter every sample 10 times. Two different modes are considered in identifying individuals according to their speech samples. In the closed-set speaker identification, it is found that all tested LPC-derived features outperform the raw LPC coefficients and 84% to 97% identification rates are achieved. Applying the preprocessing steps to the spe...

Research paper thumbnail of Fingerprint Identification Technique Based on Wavelet-Bands Selection Features (WBSF)

ABSTRACT The paper is concerned with the use of fingerprint (FP)features for protection against u... more ABSTRACT The paper is concerned with the use of fingerprint (FP)features for protection against unauthorized access. Wavelet features for both closed and open-set FP recognition are studied here to verify persons' identity. Fingerprints of 49 persons (32-authorized and 17-unauthorized) were taken as testing data. Each authorized person is asked to give 10-instances of his right forefinger print. In the closed-set FP recognition, the obtained recognition rates are below 90% due to the imperfections in the FP images that negatively affect the recognition rate. Preprocessing operations such as: noise-removal, segmentation, normalization and binarization are considered to improve the resulting recognition rates. A method that relies on a new selection process for wavelet decomposition bands is proposed, which enhance the recognition rates further to get about 100% in some favorable conditions. The results have shown that the wavelet descriptors using the proposed Wavelet-Bands Selection Features (WBSF) are efficient representation that can provide reliable recognition for large input variability. The open-set FP verification mode is also presented for 290 trials from 29 persons, where the obtained verification rates are greater than 97% for both Euclidean and city-block distance measures.

Research paper thumbnail of Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hypermobility symptoms in the primary health care – a retrospective observation study

Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hyp... more Diagnosis and medical investigation of hypermobile Ehlers-Danlos syndrome among patients with hypermobility symptoms in the primary health care – a retrospective observation study