Tayseer Atia - Academia.edu (original) (raw)

Papers by Tayseer Atia

Research paper thumbnail of An Evolutionary Quantum Scrambling Scheme for Medical Image with NEQR Representation

International Journal of Computing and Digital Systems

Image scrambling methods are necessary for original image processes in applications of quantum im... more Image scrambling methods are necessary for original image processes in applications of quantum image processing like quantum image encryption, which increases the strength of the encryption process, and the resulting image is difficult to identify and detect its details. As well as obtain a high entropy value and a histogram with a uniform peak for the encrypted image. Most researches focus on scrambling the position only or the value only; however, the quantum image scrambling researches focused on scrambling both position and value together is few. The idea of the study is developing a genetic algorithm to generate different schemes of scrambling based on the fast and elementary schemes with changing the quantum logical gate (NOT / C-Not) to get the best scheme that meets the requirements such as the cost, the complexity or the type of the image. One of the essential benefits of the proposed work is developing a general framework for the automatic generation of a suitable scrambling scheme based on image type, method, and logical circuit. The tests are simulated using MATLAB. The result confirms that hybrid value/position schemes with a C-Not gate have an entropy value close to 8 and a flat histogram. It is implicated that this framework will benefit many researchers in selecting the most appropriate scrambling method for their works.

Research paper thumbnail of An IoT-Fuzzy-Based Jamming Detection and Recovery System in Wireless Video Surveillance System

International Journal of Computational Intelligence and Applications

Wireless video surveillance system is one of the cyber-physical security systems kinds, which tra... more Wireless video surveillance system is one of the cyber-physical security systems kinds, which transmits the signal of IP cameras through a wireless medium using a radio band. WVSSs are widely deployed with large systems for use in strategic places such as city centers, public transportation, public roads, airports, and play a significant role in critical infrastructure protection. WVSSs are vulnerable to jamming attacks creating an unwanted denial of service. Hence, it is essential to secure this system from jamming attacks. In this paper, three models of IoT-fuzzy inference system-based jamming detection system are proposed for detecting and countermeasure the presence of jamming by computing two jamming detection metrics; PDR and PLR, and based on the result, the system countermeasures this attack by storing the video feed locally in the subsystem nodes. FIS models are based on Mamdani, Tsukamoto, and Sugeno fuzzy logic which optimizes the jamming detection metrics for detecting t...

Research paper thumbnail of An evolutionary- convolutional neural network for fake image detection

Indonesian Journal of Electrical Engineering and Computer Science

The fast development in deep learning techniques, besides the wide spread of social networks, fac... more The fast development in deep learning techniques, besides the wide spread of social networks, facilitated fabricating and distributing images and videos without prior knowledge. This paper developed an evolutionary learning algorithm to automatically design a convolutional neural network (CNN) architecture for deepfake detection. Genetic algorithm (GA) based on residual network (ResNet) and densely connected convolutional network (DenseNet) as building block units for feature extraction versus multilayer perceptron (MLP), random forest (RF) and support vector machine (SVM) as classifiers generates different CNN structures. A local search mutation operation proposed to optimize three layers: (batch normlization, activation function, and regularizes). This method has the advantage of working on different datasets without preprocessing. Findings using two datasets evidence the efficiency of the suggested approach where the generated models outperform the state-of-art by increasing 1% i...

Research paper thumbnail of Towards classification of images by using block-based CNN

Bulletin of Electrical Engineering and Informatics, Feb 1, 2023

Image classification is the process of assigning labeling to the input images to a fixed set of c... more Image classification is the process of assigning labeling to the input images to a fixed set of categories; however, assigning labels to the image is difficult by using the traditional method because of the large number of images. To solve this problem, we will resort to deep learning techniques. Which is enables computers to recognize and extract visual characteristics. The convolutional neural network (CNN) is a deep neural network used for many purposes, such as image classification, detection, and face recognition, due to its high-performance accuracy in classification and detection tasks. In this paper, we develop CNN based on the transfer learning approach for image classification. The network comprises two types of transfer learning, ResNet and DenseNet, as building blocks of the network with an multilayer perceptron (MLP) classifier. The proposed method does not need to preprocess before these datasets that input into the network. It was train on two datasets: the Cifar-10 and the Sign-Traffic datasets. We conclude that the proposed method achieves the best performance compared with other states of the art. The accuracy gained is 97.45% and 99.45%, respectively, where the proposed CNN increased the accuracy compared to other methods by 3%.

Research paper thumbnail of Integer Factorization Problem Solving Using Tabu Search

Journal Of Wassit For Science & Medicine, 2009

Research paper thumbnail of An IoT-fuzzy based password checker system for wireless video surveillance system

Bulletin of Electrical Engineering and Informatics

Wireless video surveillance systems (WVSS) are deployed in large environments for use in strategi... more Wireless video surveillance systems (WVSS) are deployed in large environments for use in strategic places such as town centers, public streets, and airports and play an essential role in protecting critical infrastructure. However, WVSSs are vulnerable to unauthorized access due to weak login credentials, which leads to their exploitation to launch cyberattacks on other systems, such as distributed denial-of-service attacks. Hence, it is essential to secure these systems from unauthorized access. This paper proposes the Mamdani fuzzy inference system (FIS)-based password checker algorithm to estimate the password strength ratio (PSR) of internet protocol (IP) cameras and internet of things (IoT) devices. This algorithm composes three stages, the password extraction stage, which evaluates the input parameters of FIS from the real-time streaming protocol (RTSP) protocol using a counter of password characters. Then, the processing stage uses Mamdani FIS to optimize the input parameters...

Research paper thumbnail of A Hybrid Hopfield Neural Network and Tabu Search Algorithm to Solve Routing Problem in Communication Network

Journal of Engineering Science and Technology, 2012

The development of hybrid algorithms for solving complex optimization problems focuses on enhanci... more The development of hybrid algorithms for solving complex optimization problems focuses on enhancing the strengths and compensating for the weakness of two or more complementary approaches. The goal is to intelligently combine the key elements of these approaches to find superior solutions to solve optimization problems. Optimal routing in communication network is considering a complex optimization problem. In this paper we propose a hybrid Hopfield Neural Network (HNN) and Tabu Search (TS) algorithm, this algorithm called hybrid HNN-TS algorithm. The paradigm of this hybridization is embedded. We embed the short-term memory and tabu restriction features from TS algorithm in the HNN model. The short-term memory and tabu restriction control the neuron selection process in the HNN model in order to get around the local minima problem and find an optimal solution using the HNN model to solve complex optimization problem. The proposed algorithm is intended to find the optimal path for pa...

Research paper thumbnail of A Hybrid Algorithm for Solving Frequency Assignment Problem in Cellular Network

Journal of Engineering Science and Technology, 2017

Frequency allocation problem is considered an NP problem which requires a large search space to f... more Frequency allocation problem is considered an NP problem which requires a large search space to find the optimal solution. This paper presents a hybrid algorithm between the Hopfield neural network and the tabu search techniques algorithm to allocate frequencies in the cells of cellular network. The cellular telephone system is composed of small regions called cells, it's depends on the principles of frequencies reuse due to the limited number of frequencies. As a result to this reuse the problem of frequency allocation is a raised. Simply it can be defined as the allocation of different frequencies to each cell and it's neighbouring. In this hybridization the principles of short term memory and candidate list in tabu search are embedded in Hopfield neural network to control the operation of neuron selection.

Research paper thumbnail of Load balancing routing in Time-Sensitive Networks

2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), 2016

In the research the load balancing routing model in Time-Sensitive Networks is proposed. The nove... more In the research the load balancing routing model in Time-Sensitive Networks is proposed. The novelty of the solution is a type of optimality criterion, the use of which minimizes the circuit delays. The proposed solution is compromise in terms of computational implementation as compared to the previously known models, in which the equality of the circuit delays of packets were considered as limitations, rather than optimality criterion.

Research paper thumbnail of Using the Multi-Agent System to Develop a Key Agreement Protocol

The incremental growth of computer networks caused by new users joining the network results in a ... more The incremental growth of computer networks caused by new users joining the network results in a confidentiality problem with the transmission of data. To solve this problem, symmetric/ asymmetric key cryptography is mostly used. However, this cipher suffers from the problem of secret key maintenance and distribution across the internet which is unsecure channel. To get rid of this problem, different key exchange schemes have been developed and classified as a key redistribution scheme, key distribution scheme and key agreement scheme. In this paper, a key agreement scheme based on a multi-agent system is developed. This scheme aims to exchange the secret key between two parties. The mobile agent is the heart of this scheme where it carries the program that is responsible for generating the secret key.

Research paper thumbnail of Development of a New Algorithm for Key and S-Box Generation in Blowfish Algorithm

Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data... more Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS) algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

Research paper thumbnail of Design and Implement Pseudo Random Number Generator for Block Cipher Encryption Algorithm

rddmohesr.com

The generation of pseudo-random numbers is an important and common task in computer programming. ... more The generation of pseudo-random numbers is an important and common task in computer programming. While cryptography and certain numerical algorithms require a very high degree of apparent randomness, many other operations only need a modest amount ...

Research paper thumbnail of SHA_1 Enhancement Based on Resilent Boolean Function

Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 )

SHA_1 is a one way hash function which is used in cryptographic systems to provide message authen... more SHA_1 is a one way hash function which is used in cryptographic systems to provide message authentication and integrity. In recent year this algorithm faced new type of attacks. These attacks make use of the simplicity of message expansion step to leak some information used to build a matching patterns or build differential path according to local collision. In this paper an enhanced version of SHA_1 was proposed depend on using resilent Boolean function which is a Boolean function that offers properties of balancedness, algebraic degree, correlation immunity and nonlinearity. This enhancement tends to countermeasures these attacks. Enhancement was made in two places for the original algorithm, first enhanced message expansion process, second change the value of 32 variable inputs to Boolean function in the algorithm.

Research paper thumbnail of -

Research paper thumbnail of Design and Implement Pseudo Random Number Generator for Block Cipher Encryption Algorithm

The generation of pseudo-random numbers is an important and common task in computer programming. ... more The generation of pseudo-random numbers is an important and common task in computer programming. While cryptography and certain numerical algorithms require a very high degree of apparent randomness, many other operations only need a modest amount of unpredictability Random numbers play an important role in the use of encryption for various network security applications. This paper design and implement a proposed Pseudo Random Number Generator for use in block cipher algorithm as a session key with an initialization vector) IV) to use them in cryptographic applications. The generator structure's makes use of HMAC algorithms with preprocess and post process stage to generate pseudo random sequence with length of 652-bit.

Research paper thumbnail of A HYBRID ALGORITHM FOR SOLVING FREQUENCY ASSIGNMENT PROBLEM IN CELLULAR NETWORK

Frequency allocation problem is considered an NP problem which requires a large search space to f... more Frequency allocation problem is considered an NP problem which requires a large search space to find the optimal solution. This paper presents a hybrid algorithm between the Hopfield neural network and the tabu search techniques algorithm to allocate frequencies in the cells of cellular network. The cellular telephone system is composed of small regions called cells, it's depends on the principles of frequencies reuse due to the limited number of frequencies. As a result to this reuse the problem of frequency allocation is a raised. Simply it can be defined as the allocation of different frequencies to each cell and it's neighbouring. In this hybridization the principles of short term memory and candidate list in tabu search are embedded in Hopfield neural network to control the operation of neuron selection.

Research paper thumbnail of Distributed AMELSB Replacement Method For Text Hiding

المجلة العراقية لتكنولوجيا المعلومات

Research paper thumbnail of The Robust Stream Cipher for Securing Data in the Smartphones

Journal of University of Babylon for Engineering Sciences

With the development of network and communication systems in large areas in the world, this leads... more With the development of network and communication systems in large areas in the world, this leads to increase security problems in transmission of data such as data leakage, modification, unauthorized access, and attacks. There are many types of techniques that are used to prevent these problems and protect data. One of these techniques is a stream cipher which considered the strongest and fastest method used in encryption and decryption process. In this study presented a new design for the stream cipher to protect mobile data. The strength of stream cipher depends on it is' key. There are several methods to generate key. We used three types of generator. Then, it used the combiner to convert them into a nonlinear Boolean function in order to make the generator key more secure. To implement a new generator key by using these three kinds, we used four LFSRs and one of NLFSRs or FCSRs to produce five variables Boolean function. These variables will be as an input to the combiner f...

Research paper thumbnail of An Evolutionary Quantum Scrambling Scheme for Medical Image with NEQR Representation

International Journal of Computing and Digital Systems

Image scrambling methods are necessary for original image processes in applications of quantum im... more Image scrambling methods are necessary for original image processes in applications of quantum image processing like quantum image encryption, which increases the strength of the encryption process, and the resulting image is difficult to identify and detect its details. As well as obtain a high entropy value and a histogram with a uniform peak for the encrypted image. Most researches focus on scrambling the position only or the value only; however, the quantum image scrambling researches focused on scrambling both position and value together is few. The idea of the study is developing a genetic algorithm to generate different schemes of scrambling based on the fast and elementary schemes with changing the quantum logical gate (NOT / C-Not) to get the best scheme that meets the requirements such as the cost, the complexity or the type of the image. One of the essential benefits of the proposed work is developing a general framework for the automatic generation of a suitable scrambling scheme based on image type, method, and logical circuit. The tests are simulated using MATLAB. The result confirms that hybrid value/position schemes with a C-Not gate have an entropy value close to 8 and a flat histogram. It is implicated that this framework will benefit many researchers in selecting the most appropriate scrambling method for their works.

Research paper thumbnail of An IoT-Fuzzy-Based Jamming Detection and Recovery System in Wireless Video Surveillance System

International Journal of Computational Intelligence and Applications

Wireless video surveillance system is one of the cyber-physical security systems kinds, which tra... more Wireless video surveillance system is one of the cyber-physical security systems kinds, which transmits the signal of IP cameras through a wireless medium using a radio band. WVSSs are widely deployed with large systems for use in strategic places such as city centers, public transportation, public roads, airports, and play a significant role in critical infrastructure protection. WVSSs are vulnerable to jamming attacks creating an unwanted denial of service. Hence, it is essential to secure this system from jamming attacks. In this paper, three models of IoT-fuzzy inference system-based jamming detection system are proposed for detecting and countermeasure the presence of jamming by computing two jamming detection metrics; PDR and PLR, and based on the result, the system countermeasures this attack by storing the video feed locally in the subsystem nodes. FIS models are based on Mamdani, Tsukamoto, and Sugeno fuzzy logic which optimizes the jamming detection metrics for detecting t...

Research paper thumbnail of An evolutionary- convolutional neural network for fake image detection

Indonesian Journal of Electrical Engineering and Computer Science

The fast development in deep learning techniques, besides the wide spread of social networks, fac... more The fast development in deep learning techniques, besides the wide spread of social networks, facilitated fabricating and distributing images and videos without prior knowledge. This paper developed an evolutionary learning algorithm to automatically design a convolutional neural network (CNN) architecture for deepfake detection. Genetic algorithm (GA) based on residual network (ResNet) and densely connected convolutional network (DenseNet) as building block units for feature extraction versus multilayer perceptron (MLP), random forest (RF) and support vector machine (SVM) as classifiers generates different CNN structures. A local search mutation operation proposed to optimize three layers: (batch normlization, activation function, and regularizes). This method has the advantage of working on different datasets without preprocessing. Findings using two datasets evidence the efficiency of the suggested approach where the generated models outperform the state-of-art by increasing 1% i...

Research paper thumbnail of Towards classification of images by using block-based CNN

Bulletin of Electrical Engineering and Informatics, Feb 1, 2023

Image classification is the process of assigning labeling to the input images to a fixed set of c... more Image classification is the process of assigning labeling to the input images to a fixed set of categories; however, assigning labels to the image is difficult by using the traditional method because of the large number of images. To solve this problem, we will resort to deep learning techniques. Which is enables computers to recognize and extract visual characteristics. The convolutional neural network (CNN) is a deep neural network used for many purposes, such as image classification, detection, and face recognition, due to its high-performance accuracy in classification and detection tasks. In this paper, we develop CNN based on the transfer learning approach for image classification. The network comprises two types of transfer learning, ResNet and DenseNet, as building blocks of the network with an multilayer perceptron (MLP) classifier. The proposed method does not need to preprocess before these datasets that input into the network. It was train on two datasets: the Cifar-10 and the Sign-Traffic datasets. We conclude that the proposed method achieves the best performance compared with other states of the art. The accuracy gained is 97.45% and 99.45%, respectively, where the proposed CNN increased the accuracy compared to other methods by 3%.

Research paper thumbnail of Integer Factorization Problem Solving Using Tabu Search

Journal Of Wassit For Science & Medicine, 2009

Research paper thumbnail of An IoT-fuzzy based password checker system for wireless video surveillance system

Bulletin of Electrical Engineering and Informatics

Wireless video surveillance systems (WVSS) are deployed in large environments for use in strategi... more Wireless video surveillance systems (WVSS) are deployed in large environments for use in strategic places such as town centers, public streets, and airports and play an essential role in protecting critical infrastructure. However, WVSSs are vulnerable to unauthorized access due to weak login credentials, which leads to their exploitation to launch cyberattacks on other systems, such as distributed denial-of-service attacks. Hence, it is essential to secure these systems from unauthorized access. This paper proposes the Mamdani fuzzy inference system (FIS)-based password checker algorithm to estimate the password strength ratio (PSR) of internet protocol (IP) cameras and internet of things (IoT) devices. This algorithm composes three stages, the password extraction stage, which evaluates the input parameters of FIS from the real-time streaming protocol (RTSP) protocol using a counter of password characters. Then, the processing stage uses Mamdani FIS to optimize the input parameters...

Research paper thumbnail of A Hybrid Hopfield Neural Network and Tabu Search Algorithm to Solve Routing Problem in Communication Network

Journal of Engineering Science and Technology, 2012

The development of hybrid algorithms for solving complex optimization problems focuses on enhanci... more The development of hybrid algorithms for solving complex optimization problems focuses on enhancing the strengths and compensating for the weakness of two or more complementary approaches. The goal is to intelligently combine the key elements of these approaches to find superior solutions to solve optimization problems. Optimal routing in communication network is considering a complex optimization problem. In this paper we propose a hybrid Hopfield Neural Network (HNN) and Tabu Search (TS) algorithm, this algorithm called hybrid HNN-TS algorithm. The paradigm of this hybridization is embedded. We embed the short-term memory and tabu restriction features from TS algorithm in the HNN model. The short-term memory and tabu restriction control the neuron selection process in the HNN model in order to get around the local minima problem and find an optimal solution using the HNN model to solve complex optimization problem. The proposed algorithm is intended to find the optimal path for pa...

Research paper thumbnail of A Hybrid Algorithm for Solving Frequency Assignment Problem in Cellular Network

Journal of Engineering Science and Technology, 2017

Frequency allocation problem is considered an NP problem which requires a large search space to f... more Frequency allocation problem is considered an NP problem which requires a large search space to find the optimal solution. This paper presents a hybrid algorithm between the Hopfield neural network and the tabu search techniques algorithm to allocate frequencies in the cells of cellular network. The cellular telephone system is composed of small regions called cells, it's depends on the principles of frequencies reuse due to the limited number of frequencies. As a result to this reuse the problem of frequency allocation is a raised. Simply it can be defined as the allocation of different frequencies to each cell and it's neighbouring. In this hybridization the principles of short term memory and candidate list in tabu search are embedded in Hopfield neural network to control the operation of neuron selection.

Research paper thumbnail of Load balancing routing in Time-Sensitive Networks

2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), 2016

In the research the load balancing routing model in Time-Sensitive Networks is proposed. The nove... more In the research the load balancing routing model in Time-Sensitive Networks is proposed. The novelty of the solution is a type of optimality criterion, the use of which minimizes the circuit delays. The proposed solution is compromise in terms of computational implementation as compared to the previously known models, in which the equality of the circuit delays of packets were considered as limitations, rather than optimality criterion.

Research paper thumbnail of Using the Multi-Agent System to Develop a Key Agreement Protocol

The incremental growth of computer networks caused by new users joining the network results in a ... more The incremental growth of computer networks caused by new users joining the network results in a confidentiality problem with the transmission of data. To solve this problem, symmetric/ asymmetric key cryptography is mostly used. However, this cipher suffers from the problem of secret key maintenance and distribution across the internet which is unsecure channel. To get rid of this problem, different key exchange schemes have been developed and classified as a key redistribution scheme, key distribution scheme and key agreement scheme. In this paper, a key agreement scheme based on a multi-agent system is developed. This scheme aims to exchange the secret key between two parties. The mobile agent is the heart of this scheme where it carries the program that is responsible for generating the secret key.

Research paper thumbnail of Development of a New Algorithm for Key and S-Box Generation in Blowfish Algorithm

Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data... more Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS) algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

Research paper thumbnail of Design and Implement Pseudo Random Number Generator for Block Cipher Encryption Algorithm

rddmohesr.com

The generation of pseudo-random numbers is an important and common task in computer programming. ... more The generation of pseudo-random numbers is an important and common task in computer programming. While cryptography and certain numerical algorithms require a very high degree of apparent randomness, many other operations only need a modest amount ...

Research paper thumbnail of SHA_1 Enhancement Based on Resilent Boolean Function

Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 )

SHA_1 is a one way hash function which is used in cryptographic systems to provide message authen... more SHA_1 is a one way hash function which is used in cryptographic systems to provide message authentication and integrity. In recent year this algorithm faced new type of attacks. These attacks make use of the simplicity of message expansion step to leak some information used to build a matching patterns or build differential path according to local collision. In this paper an enhanced version of SHA_1 was proposed depend on using resilent Boolean function which is a Boolean function that offers properties of balancedness, algebraic degree, correlation immunity and nonlinearity. This enhancement tends to countermeasures these attacks. Enhancement was made in two places for the original algorithm, first enhanced message expansion process, second change the value of 32 variable inputs to Boolean function in the algorithm.

Research paper thumbnail of -

Research paper thumbnail of Design and Implement Pseudo Random Number Generator for Block Cipher Encryption Algorithm

The generation of pseudo-random numbers is an important and common task in computer programming. ... more The generation of pseudo-random numbers is an important and common task in computer programming. While cryptography and certain numerical algorithms require a very high degree of apparent randomness, many other operations only need a modest amount of unpredictability Random numbers play an important role in the use of encryption for various network security applications. This paper design and implement a proposed Pseudo Random Number Generator for use in block cipher algorithm as a session key with an initialization vector) IV) to use them in cryptographic applications. The generator structure's makes use of HMAC algorithms with preprocess and post process stage to generate pseudo random sequence with length of 652-bit.

Research paper thumbnail of A HYBRID ALGORITHM FOR SOLVING FREQUENCY ASSIGNMENT PROBLEM IN CELLULAR NETWORK

Frequency allocation problem is considered an NP problem which requires a large search space to f... more Frequency allocation problem is considered an NP problem which requires a large search space to find the optimal solution. This paper presents a hybrid algorithm between the Hopfield neural network and the tabu search techniques algorithm to allocate frequencies in the cells of cellular network. The cellular telephone system is composed of small regions called cells, it's depends on the principles of frequencies reuse due to the limited number of frequencies. As a result to this reuse the problem of frequency allocation is a raised. Simply it can be defined as the allocation of different frequencies to each cell and it's neighbouring. In this hybridization the principles of short term memory and candidate list in tabu search are embedded in Hopfield neural network to control the operation of neuron selection.

Research paper thumbnail of Distributed AMELSB Replacement Method For Text Hiding

المجلة العراقية لتكنولوجيا المعلومات

Research paper thumbnail of The Robust Stream Cipher for Securing Data in the Smartphones

Journal of University of Babylon for Engineering Sciences

With the development of network and communication systems in large areas in the world, this leads... more With the development of network and communication systems in large areas in the world, this leads to increase security problems in transmission of data such as data leakage, modification, unauthorized access, and attacks. There are many types of techniques that are used to prevent these problems and protect data. One of these techniques is a stream cipher which considered the strongest and fastest method used in encryption and decryption process. In this study presented a new design for the stream cipher to protect mobile data. The strength of stream cipher depends on it is' key. There are several methods to generate key. We used three types of generator. Then, it used the combiner to convert them into a nonlinear Boolean function in order to make the generator key more secure. To implement a new generator key by using these three kinds, we used four LFSRs and one of NLFSRs or FCSRs to produce five variables Boolean function. These variables will be as an input to the combiner f...