Mohammed Al-Husainy | Middle East Technical University (original) (raw)
Papers by Mohammed Al-Husainy
European Scientific Journal, ESJ, Apr 30, 2015
Nowadays, images became one of the most types of transmitted data through Internet. Some of these... more Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images.
Information Technology Journal, Feb 1, 2007
Information Technology Journal, Mar 15, 2007
Information Technology Journal, Apr 15, 2006
As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.
International Journal of Computing and Digital Systems
Due to the ever-increasing cybercrime and hazards on digital information stored or in transit ove... more Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon's concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.
International Journal of Information and Computer Security
International Journal Of Computing and Digital System, Aug 23, 2021
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.
The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studyin... more The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studying it firstly, and to stop over the operations which are introduced from the genetic algorithm.The candidate field for applying the operations of the genetic algorithm is the sound data compression field. This research uses the operations of the genetic algorithm for the enhancement of the performance of one of the popular compression method. Vector Quantization (VQ) method is selected in this work. After studying this method, new proposed algorithm for mixing the (GA) with this method was constructed and then the required programs for testing this algorithm was written. A good enhancement was recorded for the performance of the (VQ) method when mixed with the (GA). The proposed algorithm was tested by applying it on some sound data files. Some fidelity measures are calculated to evaluate the performance of the new proposed algorithm.
International Journal of Open Information Technologies, 2017
Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three conce... more Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three concepts that are intertwined and yet different. Most of the conflicts experienced in Nigeria are blamed on these concepts, especially religion. Nigerians do not freely discuss religion. It is a volatile subject to be discussed as a national issue. Institutions of learning shy away from studying religion as such. Religion, nonetheless, underpins and gives force to ethnicity and culture. Of the three dominant religions in Nigeria, Ancestral Religion cushions the missionary religions (Christianity and Islam). In their missionary character, they compete for sphere of influence and indoctrinate people unto fanaticism. The consequence is mutual hatred that often leads to the loss of lives and property. Religion is then seen as dysfunctional to development. The problem, however, is that people are not educated, formally and informally, on the possible contributions of religion to human development. Nigeria's tertiary institutions serve as the starting point. The paper concludes that the study of religion is indispensable for sustainable development in Nigeria. It recommends that for this type of development to be achieved, students of religion should be given a pride of place in Nigeria's politics and economy.
RAIRO - Theoretical Informatics and Applications, 2016
In the digital era, most types of transmitted data over the Internet are images. These images may... more In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) = 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size 16 × 16 bytes and the secret key as a two-dimensional block of size 16 × 16 bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.
Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. A new Least Significant Bit (LSB) steganography technique is presented in this work by treating the secret message based on its words content instead of its characters content. By using a specific small words dictionary by the sender and the receiver of the secret message, and representing each word in the secret message with an index in the words dictionary. Then embed these words indices, of the secret message, in the LSB of the pixels in the stego-image. The experimental results shown that the Word Based LSB technique will add more security to the secret message, reduces the distortion that will occur in the stego-image, increase the capability to hide very long secret message in a small stego-image, and minimize the time that is needed to hide and extract the secret message.
Management, 2012
Image encryption is one of the most methods of information hiding. A novel secure encryption meth... more Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing ...
International Journal of Electronic Security and Digital Forensics
International Journal of Advanced Computer Science and Applications, 2012
Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide se... more Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique.
Journal of Computer Science, 2009
Problem statement: Steganography hides the very existence of a message so that if successful it g... more Problem statement: Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions. In this study, we proposed a new framework of an image steganography system to hide a digital text of a secret message. Approach: The main idea for this is to use enough number of bits from each pixel in an image (7-bits in this study) to map them to 26 alphabetic English characters ('a'…'z') with some special characters that are mostly using in writing a secret message. The main goal of this method, like any steganography techniques must do, is to hide a text of a secret message in the pixels of the image in such a manner that the human visual system is not able to distinguish between the original and the stego-image, but it can be easily performed by a specialized reader machine. Results: This method was implemented practically on different (long and short) messages and images. The carrier images that are used in the experiments of this research have no discernible change in it. Conclusion: The recorded experimental results showed that this proposed method can be used effectively in the field of steganography.
International Journal of Technology: IJ Tech, Jul 29, 2019
With the wide range use of digital communication technologies, the Internet has been commonly use... more With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
Computer and Information Science, Oct 27, 2011
Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. In this paper, a new technique to hide text message in image by using what is called image steganography. By representing the ASCII code decimal value of each character, in the secret message, as a set of separated single decimal-digit, also represent each decimal pixel value in the stego-image as a set of separated single decimal-digit. The technique creates a matching list between the decimal-digits of the characters in the secret message with the decimal-digits of the pixels in the stego-image. The technique compresses the created matching list to be as small as possible to embed it in the unused file space at the end of the stego-image file. The results show that our technique provides more security against visual attack because it does not make any changes in the pixel of the stego-image.
European Scientific Journal, ESJ, Apr 30, 2015
Nowadays, images became one of the most types of transmitted data through Internet. Some of these... more Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images.
Information Technology Journal, Feb 1, 2007
Information Technology Journal, Mar 15, 2007
Information Technology Journal, Apr 15, 2006
As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.
International Journal of Computing and Digital Systems
Due to the ever-increasing cybercrime and hazards on digital information stored or in transit ove... more Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon's concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.
International Journal of Information and Computer Security
International Journal Of Computing and Digital System, Aug 23, 2021
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.
The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studyin... more The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studying it firstly, and to stop over the operations which are introduced from the genetic algorithm.The candidate field for applying the operations of the genetic algorithm is the sound data compression field. This research uses the operations of the genetic algorithm for the enhancement of the performance of one of the popular compression method. Vector Quantization (VQ) method is selected in this work. After studying this method, new proposed algorithm for mixing the (GA) with this method was constructed and then the required programs for testing this algorithm was written. A good enhancement was recorded for the performance of the (VQ) method when mixed with the (GA). The proposed algorithm was tested by applying it on some sound data files. Some fidelity measures are calculated to evaluate the performance of the new proposed algorithm.
International Journal of Open Information Technologies, 2017
Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three conce... more Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three concepts that are intertwined and yet different. Most of the conflicts experienced in Nigeria are blamed on these concepts, especially religion. Nigerians do not freely discuss religion. It is a volatile subject to be discussed as a national issue. Institutions of learning shy away from studying religion as such. Religion, nonetheless, underpins and gives force to ethnicity and culture. Of the three dominant religions in Nigeria, Ancestral Religion cushions the missionary religions (Christianity and Islam). In their missionary character, they compete for sphere of influence and indoctrinate people unto fanaticism. The consequence is mutual hatred that often leads to the loss of lives and property. Religion is then seen as dysfunctional to development. The problem, however, is that people are not educated, formally and informally, on the possible contributions of religion to human development. Nigeria's tertiary institutions serve as the starting point. The paper concludes that the study of religion is indispensable for sustainable development in Nigeria. It recommends that for this type of development to be achieved, students of religion should be given a pride of place in Nigeria's politics and economy.
RAIRO - Theoretical Informatics and Applications, 2016
In the digital era, most types of transmitted data over the Internet are images. These images may... more In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) = 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size 16 × 16 bytes and the secret key as a two-dimensional block of size 16 × 16 bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.
Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. A new Least Significant Bit (LSB) steganography technique is presented in this work by treating the secret message based on its words content instead of its characters content. By using a specific small words dictionary by the sender and the receiver of the secret message, and representing each word in the secret message with an index in the words dictionary. Then embed these words indices, of the secret message, in the LSB of the pixels in the stego-image. The experimental results shown that the Word Based LSB technique will add more security to the secret message, reduces the distortion that will occur in the stego-image, increase the capability to hide very long secret message in a small stego-image, and minimize the time that is needed to hide and extract the secret message.
Management, 2012
Image encryption is one of the most methods of information hiding. A novel secure encryption meth... more Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing ...
International Journal of Electronic Security and Digital Forensics
International Journal of Advanced Computer Science and Applications, 2012
Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide se... more Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique.
Journal of Computer Science, 2009
Problem statement: Steganography hides the very existence of a message so that if successful it g... more Problem statement: Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions. In this study, we proposed a new framework of an image steganography system to hide a digital text of a secret message. Approach: The main idea for this is to use enough number of bits from each pixel in an image (7-bits in this study) to map them to 26 alphabetic English characters ('a'…'z') with some special characters that are mostly using in writing a secret message. The main goal of this method, like any steganography techniques must do, is to hide a text of a secret message in the pixels of the image in such a manner that the human visual system is not able to distinguish between the original and the stego-image, but it can be easily performed by a specialized reader machine. Results: This method was implemented practically on different (long and short) messages and images. The carrier images that are used in the experiments of this research have no discernible change in it. Conclusion: The recorded experimental results showed that this proposed method can be used effectively in the field of steganography.
International Journal of Technology: IJ Tech, Jul 29, 2019
With the wide range use of digital communication technologies, the Internet has been commonly use... more With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.
Computer and Information Science, Oct 27, 2011
Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. In this paper, a new technique to hide text message in image by using what is called image steganography. By representing the ASCII code decimal value of each character, in the secret message, as a set of separated single decimal-digit, also represent each decimal pixel value in the stego-image as a set of separated single decimal-digit. The technique creates a matching list between the decimal-digits of the characters in the secret message with the decimal-digits of the pixels in the stego-image. The technique compresses the created matching list to be as small as possible to embed it in the unused file space at the end of the stego-image file. The results show that our technique provides more security against visual attack because it does not make any changes in the pixel of the stego-image.