Papers by Salah T . Allawi
International journal of electrical and computer engineering systems
One of the most important challenges facing researchers is to find new methods to protect data se... more One of the most important challenges facing researchers is to find new methods to protect data sent over the Internet and prevent unauthorized access to it. In this paper, we present a new method for encrypting image data divided into two stages. The first stage requires redistributing the positions of the pixels by using a key of random numbers generated by linear feedback shift registers and then encrypting the data using deoxyribonucleic acid rules. The data generated in the previous stage is encrypted again using chaotic maps to increase the level of security in the second stage. Several statistical tests were implemented to verify the efficiency of the proposed method and compare the results with the work of other researchers. The results of the tests proved a reasonable safety rate compared to other techniques.
A new method will be proposed in this paper to encrypt an image using a secret key contain an ima... more A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column in the resulting image of the first encryption process. The experimental results show that the new proposed method is efficient and has high security features.
Govarî Qeła, Apr 15, 2017
International journal of electrical and computer engineering systems, Dec 21, 2022
One of the most important challenges facing researchers is to find new methods to protect data se... more One of the most important challenges facing researchers is to find new methods to protect data sent over the Internet and prevent unauthorized access to it. In this paper, we present a new method for encrypting image data divided into two stages. The first stage requires redistributing the positions of the pixels by using a key of random numbers generated by linear feedback shift registers and then encrypting the data using deoxyribonucleic acid rules. The data generated in the previous stage is encrypted again using chaotic maps to increase the level of security in the second stage. Several statistical tests were implemented to verify the efficiency of the proposed method and compare the results with the work of other researchers. The results of the tests proved a reasonable safety rate compared to other techniques.
Journal of Engineering and Applied Sciences, Oct 31, 2019
Indonesian Journal of Electrical Engineering and Computer Science, Jun 1, 2023
Protecting information sent through insecure internet channels is a significant challenge facing ... more Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signal-noise ratio (PSNR), mean square error (MSE) and correlation) were conducted on a group of images to determine the strength and efficiency of the proposed method, and the result proves that the proposed method provided a good level of safety. The obtained results were compared with those of other methods, and the result of comparing confirms the superiority of the proposed method.
Indonesian Journal of Electrical Engineering and Computer Science
Protecting information sent through insecure internet channels is a significant challenge facing ... more Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signal-noise ratio (PSNR), mean square error (MSE) and correlation) were conducted on a group of images to determine the strength and efficiency of the proposed method, and the result proves that the proposed method provided a good level of safety. The obtaine...
A new method will be proposed in this paper to encrypt an image using a secret key contain an ima... more A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column in the resulting image of the first encryption process. The experimental results show that the new proposed method is efficient and has high security features.
Abstract- Using the chaotic theory in the color image<br> encryption become a popular resea... more Abstract- Using the chaotic theory in the color image<br> encryption become a popular research field in recent<br> decades. This paper suggests a color image encryption<br> method based on combines between 3D-Logistic maps<br> and 2D Cat Mapping. This method depends on splitting<br> the original color image in to three essential components<br> Red, Green and Blue in the first stage and then using<br> 3D-Logistic maps to generate random numbers to<br> encrypt the information of image through generating<br> three keys one for each essential color in the second<br> stage. using the 2D Cat Mapping to generate random<br> numbers to scramble the pixels in the image that got<br> from previous step . After applying the proposed<br> method, we obtain an image that has two levels of<br> protection (encryption and rearranging the locations of<br> the image pixels).<br> Keywords- Chaotic Map; 3D-Logi...
Secure transmissions of information become a critical issue in the digital world with the growing... more Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.
When applying the algorithms that depend upon the use of Chaotic Maps in the image encryption ope... more When applying the algorithms that depend upon the use of Chaotic Maps in the image encryption operation a number of advantages are provided such as high security, speed and computational power. This paper suggests a new method combines between 1D-Logistic maps and 2D Cat Mapping to encrypt the color image. This method depends upon using 1D-Logistic maps to generate random numbers to encrypt the information of image through generating three keys (Rk, Gk, Bk) one for each color (R, G, B) in the first stage. In the second stage using the 2D Cat Mapping to generate random numbers to change the position of the pixels in the image that got from previous step.
Qalaai Zanist Scientific Journal
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016
Journal of Engineering and Applied Sciences
Proceeding of 1st International Conference on Information Technology
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016
Uploads
Papers by Salah T . Allawi