rashiq marie | Taibah University, Madinah, Saudi Arabia (original) (raw)
Papers by rashiq marie
International Journal of Intelligent Computing Research, 2010
There is a number of previous studies have demonstarted the self-similarity(self-affinity) proper... more There is a number of previous studies have demonstarted the self-similarity(self-affinity) property of Internet network data traffic. Self-affinity and self-similarity are properties we associate with fractals. In this paper, firstly, we adopt the Random Scaling Fractal (RSF) model to capture the fractal behavior of internet traffic and to simulate their selffaffine characteristics. The relevance and validation of the proposed model have demonstrated by application of studies for measured Internet traffic. Secondly, we utilize the fractal nature of internet packets traffic for the application to securing data transmission through the Internet and instead of attaching a complete file (encrypted or otherwise) at a given time, we first encrypt the file, then split a binary representation of the file into a sequnce of binary files. The sizes of binary files are determined by the fractal characteristics of the Internet through which the data is to be transmitted using our proposed model. The data is then applied to the Internet as e-mail attachments and submitted according to a genrated sequence of inter-submission times computed that is computed using the same model. The recipient of the data recovers the information by concatenating the files sequence.
The two common different techniques for securing data transmission are cryptography and steganogr... more The two common different techniques for securing data transmission are cryptography and steganography. Steganography is not intended to replace cryptography but rather to supplement it. If a message is encrypted and hidden with a steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. In this paper, two layers of security are used to secure the hidden information and to add more complexity for steganalysis. We combined schemes of cryptography with steganography in one system called CryptSteg for hiding secret messages. By CryptSteg we first encoded the secret message (plain-text) using chaotic stream cipher based on a secret key (crypto-key) then the encoded data was hidden behind a cover-image by changing Kth least significant bits (k-LSB) of cover-image pixels in random way which makes it superior to the conventional approach. A random-like sequence generated by a chaotic map is used as the reference for embe...
This thesis studies the application of fractal geometry to the application of covert communicatio... more This thesis studies the application of fractal geometry to the application of covert communications systems. This involves the process of hiding information in background noise; the information being encrypted or otherwise. Models and methods are considered with regard to two communications systems: (i) wireless communications; (ii) internet communications. In practice, of course, communication through the Internet cannot be disassociated from wireless communications as Internet traffic is 'piped' through a network that can include wireless communications (e.g. satellite telecommunications). However, in terms of developing models and methods for covert communications in general, points (i) and (ii) above require different approaches and access to different technologies. With regard to (i) above, we develop two methods based on fractal modulation and multi-fractal modulation. With regard to (ii), we implement a practical method and associated software for covert transmission ...
International Journal of Advanced Computer Science and Applications, 2021
International Journal of Advanced Trends in Computer Science and Engineering, 2020
The growing potential of modern communications needs the use of secure means to protect informati... more The growing potential of modern communications needs the use of secure means to protect information from unauthorized access and use during transmission. In general, encryption a message using cryptography techniques and then hidden a message with a steganography methods provides an additional layer of protection. Furthermore, using these combination reduces the chance of finding the hidden message. This paper proposed a system which combines schemes of cryptography with steganography for hiding secret messages and to add more complexity for steganography. The proposed system secret message encoded with chaotic stream cipher and afterwards the encoded data is hidden behind an RGB or Gray cover image by modifying the kth least significant bits (k-LSB) of cover image pixels. The resultant stego-image less distorters. After which can be used by the recipient to extract that bit-plane of the image. In fact, the schemes of encryption/decryption and embedding/ extracting in the proposed system depends upon two shred secret keys between the sender and the receiver. An experiment shows that using an unauthorized secret keys between the sender and the receiver have totally different messages from the original ones which improve the confidentiality of the images.
There are many models in the literature that consider the main characteristics of Internet traffi... more There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.
PsycEXTRA Dataset, 2011
Lineer olmayan oluşum denklemleri çok sayıda alanda ortaya çıkan problemlerin matematiksel modell... more Lineer olmayan oluşum denklemleri çok sayıda alanda ortaya çıkan problemlerin matematiksel modelleri için temel oluşturur. Geçmiş yıllarda, uygulamalı matematikte oluşum denklemleri önemli bir yer kazanmıştır. Bu çalışma, lineer olmayan oluşum denklemleri için pertürbasyon yöntemi olarak bilinen çok ölçekli açılım metoduyla ilgilidir. Bu raporda, (1 + 1) boyutlu beşinci mertebeden lineer olmayan Caudrey-Dodd-Gibbon (CDG) denkleminin analizi için çok ölçekli açılım metodu uygulanmıştır ve lineer olmayan Schrödinger (NLS) tipi denklemi elde edilmiştir.
Proceedings of the Fourth …, 2007
Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search:... more Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2014
This paper investigates the use of fractal geometry for analyzing ECG time series signals. A tech... more This paper investigates the use of fractal geometry for analyzing ECG time series signals. A technique of identifying cardiac diseases is proposed which is based on estimation of Fractal Dimension (FD) of ECG recordings. Using this approach, variations in texture across an ECG signal can be characterized in terms of variations in the FD values. An overview of methods for computing the FD is presented focusing on the Power Spectrum Method (PSM) that makes use of the characteristic of Power Spectral Density Function (PSDF) of a Random Scaling Fractal Signal. A 20 dataset of ECG signals taken from MIT-BIH arrhythmia database has been utilized to estimate the FD, which established ranges of FD for healthy person and persons with various heart diseases. The obtained ranges of FD are presented in tabular fashion with proper analysis. Moreover, the experimental results showing comparison of Normal and Abnormal (arrhythmia) ECG signals and demonstrated that the PSM shows a better distinguis...
International Journal of Intelligent Computing Research, 2010
There is a number of previous studies have demonstarted the self-similarity(self-affinity) proper... more There is a number of previous studies have demonstarted the self-similarity(self-affinity) property of Internet network data traffic. Self-affinity and self-similarity are properties we associate with fractals. In this paper, firstly, we adopt the Random Scaling Fractal (RSF) model to capture the fractal behavior of internet traffic and to simulate their selffaffine characteristics. The relevance and validation of the proposed model have demonstrated by application of studies for measured Internet traffic. Secondly, we utilize the fractal nature of internet packets traffic for the application to securing data transmission through the Internet and instead of attaching a complete file (encrypted or otherwise) at a given time, we first encrypt the file, then split a binary representation of the file into a sequnce of binary files. The sizes of binary files are determined by the fractal characteristics of the Internet through which the data is to be transmitted using our proposed model. The data is then applied to the Internet as e-mail attachments and submitted according to a genrated sequence of inter-submission times computed that is computed using the same model. The recipient of the data recovers the information by concatenating the files sequence.
The two common different techniques for securing data transmission are cryptography and steganogr... more The two common different techniques for securing data transmission are cryptography and steganography. Steganography is not intended to replace cryptography but rather to supplement it. If a message is encrypted and hidden with a steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. In this paper, two layers of security are used to secure the hidden information and to add more complexity for steganalysis. We combined schemes of cryptography with steganography in one system called CryptSteg for hiding secret messages. By CryptSteg we first encoded the secret message (plain-text) using chaotic stream cipher based on a secret key (crypto-key) then the encoded data was hidden behind a cover-image by changing Kth least significant bits (k-LSB) of cover-image pixels in random way which makes it superior to the conventional approach. A random-like sequence generated by a chaotic map is used as the reference for embe...
This thesis studies the application of fractal geometry to the application of covert communicatio... more This thesis studies the application of fractal geometry to the application of covert communications systems. This involves the process of hiding information in background noise; the information being encrypted or otherwise. Models and methods are considered with regard to two communications systems: (i) wireless communications; (ii) internet communications. In practice, of course, communication through the Internet cannot be disassociated from wireless communications as Internet traffic is 'piped' through a network that can include wireless communications (e.g. satellite telecommunications). However, in terms of developing models and methods for covert communications in general, points (i) and (ii) above require different approaches and access to different technologies. With regard to (i) above, we develop two methods based on fractal modulation and multi-fractal modulation. With regard to (ii), we implement a practical method and associated software for covert transmission ...
International Journal of Advanced Computer Science and Applications, 2021
International Journal of Advanced Trends in Computer Science and Engineering, 2020
The growing potential of modern communications needs the use of secure means to protect informati... more The growing potential of modern communications needs the use of secure means to protect information from unauthorized access and use during transmission. In general, encryption a message using cryptography techniques and then hidden a message with a steganography methods provides an additional layer of protection. Furthermore, using these combination reduces the chance of finding the hidden message. This paper proposed a system which combines schemes of cryptography with steganography for hiding secret messages and to add more complexity for steganography. The proposed system secret message encoded with chaotic stream cipher and afterwards the encoded data is hidden behind an RGB or Gray cover image by modifying the kth least significant bits (k-LSB) of cover image pixels. The resultant stego-image less distorters. After which can be used by the recipient to extract that bit-plane of the image. In fact, the schemes of encryption/decryption and embedding/ extracting in the proposed system depends upon two shred secret keys between the sender and the receiver. An experiment shows that using an unauthorized secret keys between the sender and the receiver have totally different messages from the original ones which improve the confidentiality of the images.
There are many models in the literature that consider the main characteristics of Internet traffi... more There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.
PsycEXTRA Dataset, 2011
Lineer olmayan oluşum denklemleri çok sayıda alanda ortaya çıkan problemlerin matematiksel modell... more Lineer olmayan oluşum denklemleri çok sayıda alanda ortaya çıkan problemlerin matematiksel modelleri için temel oluşturur. Geçmiş yıllarda, uygulamalı matematikte oluşum denklemleri önemli bir yer kazanmıştır. Bu çalışma, lineer olmayan oluşum denklemleri için pertürbasyon yöntemi olarak bilinen çok ölçekli açılım metoduyla ilgilidir. Bu raporda, (1 + 1) boyutlu beşinci mertebeden lineer olmayan Caudrey-Dodd-Gibbon (CDG) denkleminin analizi için çok ölçekli açılım metodu uygulanmıştır ve lineer olmayan Schrödinger (NLS) tipi denklemi elde edilmiştir.
Proceedings of the Fourth …, 2007
Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search:... more Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2014
This paper investigates the use of fractal geometry for analyzing ECG time series signals. A tech... more This paper investigates the use of fractal geometry for analyzing ECG time series signals. A technique of identifying cardiac diseases is proposed which is based on estimation of Fractal Dimension (FD) of ECG recordings. Using this approach, variations in texture across an ECG signal can be characterized in terms of variations in the FD values. An overview of methods for computing the FD is presented focusing on the Power Spectrum Method (PSM) that makes use of the characteristic of Power Spectral Density Function (PSDF) of a Random Scaling Fractal Signal. A 20 dataset of ECG signals taken from MIT-BIH arrhythmia database has been utilized to estimate the FD, which established ranges of FD for healthy person and persons with various heart diseases. The obtained ranges of FD are presented in tabular fashion with proper analysis. Moreover, the experimental results showing comparison of Normal and Abnormal (arrhythmia) ECG signals and demonstrated that the PSM shows a better distinguis...