Academia.eduAcademia.edu

Digital Image Cryptography using Index Keys

2023, International Journal of Computer Science and Mobile Computing (IJCSMC)

https://doi.org/10.47760/ijcsmc.2023.v12i02.003

A simple and easy to implement method of data cryptography will be introduced. This method can be easily used to encrypt-decrypt digital images with any type and size, it can be used to treat gray images, color images and secret messages. The simplified encryption and decryption function will minimize the required time for cryptography and they will use a simple operation of pixels' values rearrangement to apply encryption and decryption. The values rearrangement is to be applied using a generated index key. The index key is generated using the chaotic logistic key formed by running a chaotic logistic map model using a selected values of chaotic parameters. The proposed method will increase the level of image protection by using a private key which is capable to increase the key space to resist hacking attacks. The proposed method will be tested and implemented using various images, the obtained results will be analyzed to prove the quality, efficiency and sensitivity of the proposed method.

Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IMPACT FACTOR: 7.056 IJCSMC, Vol. 12, Issue. 2, February 2023, pg.26 – 37 Digital Image Cryptography using Index Keys Prof. Ziad Alqadi; Prof. Qazem Jabber Albalqa Applied University Faculty of Engineering Technology Jordan Amman DOI: https://doi.org/10.47760/ijcsmc.2023.v12i02.003 Abstract: A simple and easy to implement method of data cryptography will be introduced. This method can be easily used to encrypt-decrypt digital images with any type and size, it can be used to treat gray images, color images and secret messages. The simplified encryption and decryption function will minimize the required time for cryptography and they will use a simple operation of pixels’ values rearrangement to apply encryption and decryption. The values rearrangement is to be applied using a generated index key. The index key is generated using the chaotic logistic key formed by running a chaotic logistic map model using a selected values of chaotic parameters. The proposed method will increase the level of image protection by using a private key which is capable to increase the key space to resist hacking attacks. The proposed method will be tested and implemented using various images, the obtained results will be analyzed to prove the quality, efficiency and sensitivity of the proposed method. Keywords: Cryptography, PK, index key, CLK, CLMM, quality, speed, sensitivity. Introduction Digital images [48-54] are represented by a 2D matrix (gray image) or a 3D matrix (color image: one 2D matrix for each color: red, green and blue) (see figure 1) [1-10], each element in the matrix represents the color value and it falls within the range 0 to 255. Color histogram is a vector of 256 elements, and each element value points to the repetition of this value in the image, histogram can be easily used to test the image quality [40-47]. Digital images are very popular data types and they are used in various computer applications. Digital image may be secret or private or holding secret data, thus it requires protection from being hacked by unauthorized persons. One of the most popular methods used to protect digital images is data cryptography method. Cryptography means image encryption before sending and image decryption after image receiving [30-35]. The crypto system as shown in figure 2 contains: Source image (plain image), encrypted image (cipher image), decrypted image (plain image), private key (PK), encryption function and decryption function [35-39]. © 2023, IJCSMC All Rights Reserved 26 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 The objectives of this paper research is to introduce a method of image cryptography which must satisfy the following requirements [15-20]: - Multipurpose using: the method will be used to encrypt-decrypt color images, gray images and secret messages. - Image protection: Providing a high level of security by using a complicated secret private key. - High speed of processing: Simplifying the encryption and decryption functions and minimizing the encryption-decryption time, thus maximizing the throughput of data cryptography process. Figure 1: Color image and representations Figure 2: Crypto system © 2023, IJCSMC All Rights Reserved 27 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 - Image quality: the encrypted image must have a low quality, it must be damaged image and the quality parameters measured between the source image and encrypted image must satisfy the requirements listed in table 1 [26-30] (High mean squ8are error (MSE), low peak signal to noise ratio (PSNR), low correlation coefficient (CC), and high number of values change ratio (NVCR)). While the quality of the decrypted image must be very high and the decrypted image must be identical to the source image) [20-25]. Table 1: Quality requirements Quality parameters Measured between source and encrypted images Measured between source and decrypted images MSE PSNR NVCR(%) Low CCred, CCgreen, CCblue Low High 0 Infinite 1 0 High Many methods were introduced and used to encrypt-decrypt digital data, many of these methods were based on the standards of data cryptography (DES and AES) [8-12], these methods are suitable to deal with small data sizes, and they use a fixed data blocks and the efficiency of these methods is low. In [1] the authors provided a performance comparisons of standard methods and it was shown that DES method provided a throughput of 7988 bytes per second, 3DES provided 2683 bytes per second, AES provided 5326 bytes per second, while BF provided 10176 bytes per second. These throughputs are too small and it is not convenient to use them to encrypt-decrypt large size data such as digital color image. In [13] the authors introduced a method base on chaotic map model, the throughput was improved and reached 0.1691 M byte per second, while in [14] the introduced method gave a throughput equal 0.71 M byte per second. In [2] the authors made performance comparisons between chaotic and non-chaotic methods of data cryptography, the final results of comparisons are shown in table 2. Table 2: Cryptography methods performance comparisons [2-7] Method Throughput(K bytes per second) Non-chaotic approach[2] 170.3906 Chaotic approach{2] 141.2305 Hyper Chaotic approach[2] 636.3379 In [3] 888.8867 In [4] 638.4082 In [5] 911.0352 In [6] 360.4102 In [7] 384.9609 In [3] the authors provided a robust and fast image encryption scheme based on a mixing technique. In [4] the authors provided cosine-transform-based chaotic system for image encryption, while in [5] the authors introduced a novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. In [6] the authors introduced Multiple-image Encryption Algorithm Based on DNA Encoding and Chaotic System, while in [7] the authors produced a multiple-image encryption with bit-plane decomposition and chaotic maps, these methods provided good quality a have various speeds as shown in table 2. © 2023, IJCSMC All Rights Reserved 28 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 The Proposed Method The proposed method uses a PK, which contains the values of the chaotic parameters required to run a chaotic logistic map model (CLMM) to generate a chaotic logistic key (CLK), the generated CLK is to be converted to index key using the mat lab function sort. The length of the index key is equal 256 to cover the color range 0 to 255. The following is a sequence of operation needed to generate the index key: The contents of the index key depend on the selected values of CLMM parameters, making any changes in these values will change the index key, and the key is very sensitive to the selected values of the PK, figure 3 shows how the index key will be changed when changing the CLMM parameters: Figure 3: Changing CLMM parameters changes the index keys The index key will contain the values from 0 to 255, this key will be used to encrypt-decrypt the pixel’s values by applying pixels’ values rearrangement, in the encryption phase the pixel value will be replaced by the contents of the index key pointed by the pixel value, in the decryption phase the pixel value will be replaced by the index of the index key which contains the pixel value. The pixel’s rearrangement operation is a very simple operation and it will simplify the process of encryption and decryption. Suppose that the pixel’s range is 0 to 9, the index key here must contain 10 elements, figures 4 and 5 show an examples of using the generated index keys to apply image encryption and decryption: © 2023, IJCSMC All Rights Reserved 29 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 Figure 4: Using index key (example 1) Figure 5: Using index key (example 2) The proposed encryption phase can be implemented applying the following steps: Step 1: Image preparation: Get the image, retrieve the image size, this step can be implemented applying the following mat lab sequence of operations: Step 2: Index key generation: Get the PK, run CLMM to generate CLK, convert CLK to index key, this step can be implemented applying the following mat lab sequence of operations: © 2023, IJCSMC All Rights Reserved 30 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 Step 3: Pixels values rearrangement: for each pixel in the image use the index key to rearrange the values, , this step can be implemented applying the following mat lab sequence of operations: The decryption phase can be implemented using the same steps but the rearrangement must be performed using the following sequence of mat lab operations: Implementation and Results Discussion The proposed method was implemented using various images, figures 6, 7, and 8 show a sample outputs of the process of implementation: Figure 6: Sample of source image © 2023, IJCSMC All Rights Reserved 31 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 Figure 7: Encrypted image and histograms Red histogram Decrypted image 3000 2000 1000 0 0 Green histogram 200 Blue histogram 3000 3000 2000 2000 1000 1000 0 100 0 0 100 200 0 100 200 Figure 8: Decrypted image and histogram From figures 7 and 8 we can visually prove the quality of the proposed method, the encrypted image is a damaged image, while the decrypted image is identical to the source image. The speed of the proposed method was tested, several images were selected and processed using the proposed method, table 3 shows the obtained speed results (encryption time (ET) and throughput (TP)): Image 1 2 3 4 5 6 Average Size(byte) 150849 518400 1890000 4326210 5140800 6119256 Table 3: speed results ET(second) 0.0400 0.1620 1.0300 3.1250 3.9940 5.1600 TP(K bytes per second) 3682.8 3125.0 1791.9 1351.9 1257.0 1158.1 2061.1 From table 3 we can see that the proposed method gave good speed results for all images (with any size), the results are better than the results of the methods used by other authors (which are listed in the introduction part), the © 2023, IJCSMC All Rights Reserved 32 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 proposed method speeds up the process of cryptography and it provides a significant speed up comparing with other existing methods of data cryptography as shown in table 4: Method Table 4: Speed comparisons Throughput(K bytes per second) Non-chaotic approach[2] Chaotic approach{2] Hyper Chaotic approach[2] In [3] In [4] In [5] In [6] In [7] Proposed 170.3906 141.2305 636.3379 888.8867 638.4082 911.0352 360.4102 384.9609 2061.1 Speed up method 12.0963 14.5939 3.2390 2.3187 3.2285 2.2624 5.7188 5.3541 1.0000 of the proposed The proposed method was tested for quality, the selected images were processed and the quality parameters were calculated, the obtained values showed that the proposed method satisfied the quality requirements listed in table 1, table 5 shows the quality parameters measured between the source images and the encrypted ones. Image 1 MSE 12535 2 10509 3 10964 4 9317.9 5 9242.9 6 6856.2 Remarks High Table 5: Quality parameters of the encrypted images PSNR CCr, CCg, CCb 16.4622 0.0165, -0.0105, 0.00084836 18.2256 0.0196, 0.0079, 0.0084 17.8011 0.0190, 0.0129, 0.0803 19.4284 0.0020, 0.0515, 0.0125 19.5092 0.0027, 0.0347, 0.0302 22.4961 -0.0393, 0.0318, 0.0020 Low Low NVCR(%) 100 100 100 100 100 100 High The generated decrypted image depends on the selected values of the PK, the encryption and decryption phases must use the same PK, any changes in the PK during the decryption phase will be considered as a hacking attempt by producing a damaged decrypted image. Image 2 was processed and encrypted using PK1, the decrypted image was obtained using each of the following PKs: © 2023, IJCSMC All Rights Reserved 33 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 Figures 9 and 10 show the encrypted and decrypted images, while table 6 shows the quality parameters between the source image and the decrypted images using various PKs in the decryption phase. Figure 9: Encrypted image using PK1 Figure 10: Decrypted image using other PK Table 6: Quality parameters of the decrypted images using various PKs MSE PSNR CCr, CCg, CCb NVCR Remarks 0 7989.9 Infinite 20.9659 PK3 9842.1 18.8810 PK4 10820 17.9336 Used PK in the decryption phase PK1 PK2 © 2023, IJCSMC All Rights Reserved 1, 1 , 1 0.2928, 0.2615 0.0875, 0.0821 -0.0027, 0.0100 0.2767, 0 100 Correct Damaged 0.0998, 100 Damaged -0.0036, 100 Damaged 34 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 From figures 9 and 10 and from table 6 we can see that the obtained decrypted image is very sensitive to the selected values of the PK Conclusion A simplified encryption and decryption functions were proposed, the process of pixels’ values cryptography was performed using values rearrangement based on the indexes and the contents of the generated index key. The proposed method provided a good level of image protection by using a special complicated private key; this key contains the values of the chaotic parameters needed to run a chaotic logistic map model to generate a chaotic logistic key, which was converted to index key. The values and the indexes of the index key were used to apply image encryption and decryption. The proposed method was tested using various color images, and it was shown that the proposed method satisfied the quality requirements. The speed of the proposed method was tested and it was shown that the proposed method provided a significant speed up comparing with other existing methods of data cryptography. The generated decrypted images were very sensitive to the selected values of the private key, any changes in the private key during the decryption phase was considered as a hacking attempt by producing a damaged decrypted image. References [1]. Aamer Nadeem, Dr M. Yuns Javed, A Performance Comparison of Data Encryption Algorithms, Conference Paper · September 2005 DOI: 10.1109/ICICT.2005.1598556 · Source: IEEE Explore. [2]. M. Bala Kumara, P. Karthikkab, N. Dhivyac, T. Gopalakrishnan, A Performance Comparison of Encryption Algorithms for Digital Images, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 2, February – 2014. [3]. Lee Mariel Heucheun Yepdia, Alain Tiedeu, and Guillaume Kom, A Robust and Fast Image Encryption Scheme Based on a Mixing Technique, Security and Communication Networks, Volume 2021 |Article ID 6615708 | https://doi.org/10.1155/2021/6615708 [4]. Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 2019. [5]. M. Asgari-chenaghlu, M.-A. Balafar, and M.-R. Feizi-Derakhshi, “A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, p. 1, 2019. [6]. X. Zhang and X. Wang, Multiple-image Encryption Algorithm Based on DNA Encoding and Chaotic System, Springer, New York, NY, USA, 2019. [7]. J. S. Zhenjun and R. Sun, “Multiple-image encryption with bit-plane decomposition and chaotic maps,” Optics and Lasers in Engineering, vol. 80, pp. 1–11, 2016. [8]. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, pp. 280-286, December 2008. [9]. W. Stallings, Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006. [10]. Singh S Preet, Mani Raman, “Comparison of Data Encryption Algorithms”, International Journal of Computer science and Communications, Vol. 2, No.1, January-June 2011, pp. 125-127. [11]. Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326. [12]. Agrawal Monika, Mishra Pradeep, “A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877882. [13]. Rania A. Elmanfaloty, Ehab Abou-Bakr, An Image Encryption Scheme Using a 1D Chaotic Double Section Skew Tent Map, Complexity, Volume 2020 |Article ID 7647421 | https://doi.org/10.1155/2020/7647421. [14]. Vijayalakshmi, C., Lavanya, L., Navya, C.: A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering 4(1), 909-917 (2016). [15]. M. Atheer, “FPGA Based Image Encryption Using Chaotic Systems”, PhD. thesis in Electronic Engineering University of Technology, October 2016. © 2023, IJCSMC All Rights Reserved 35 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 [16]. Majed O. Al-Dwairi, Amjad Y. Hendi, Mohamed S. Soliman, Ziad A.A. Alqadi, A new method for voice signal features creation, International Journal of Electrical and Computer Engineering (IJECE), vol. 9, issue 5, pp. 4092-4098, 2018. [17]. Akram A. Moustafa and Ziad A. Alqadi, A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image, Journal of Computer Science 5 (5): 355-362, 2009. [18]. ZA Alqadi, Musbah Aqel, Ibrahiem MM El Emary, Performance analysis and evaluation of parallel matrix multiplication algorithms, World Applied Sciences Journal, vol. 5, issue 2, pp. 211-214, 2008. [19]. Ayman Al-Rawashdeh, Ziad Al-Qadi, using wave equation to extract digital signal features, Engineering, Technology & Applied Science Research, vol. 8, issue 4, pp. 1356-1359, 2018. [20]. Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Enhancing the Capacity of LSB Method by Introducing LSB2Z Method, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 76-90, 2019. [21]. Ziad A. Alqadi, Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, Optimized True-RGB color Image Processing, World Applied Sciences Journal 8 (10): 1175-1182, ISSN 1818-4952, 2010. [22]. Waheeb, A. and Ziad AlQadi, Gray image reconstruction. Eur. J. Sci. Res., 27: 167-173, 2009. [20].A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using a New R'G'I Model”, Journal of Computer Science, Vol.5, No. 4, pp. 250-254, 2009. [23]. K Matrouk, A Al-Hasanat, H Alasha'ary, Z. Al-Qadi Al-Shalabi, “Speech fingerprint to identify isolated word person”, World Applied Sciences Journal, Vol. 31, No. 10, pp. 1767-1771, 2014. [24]. J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, “A Novel zero-error method to create a secret tag for an image”, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018. [25]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of Color Image Steganography, JCSMC, Vol.5, Issue. 11, November 2016, pg.37–43. [26]. M. Jose, “Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality”, International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014. [27]. M. Juneja, P. S. Sandhu, An improved LSB based Steganography with enhanced Security and Embedding/Extraction, 3rd International Conference on Intelligent Computational Systems, Hong Kong China, January 26-27, 2013. [28]. H. Alasha'ary, K. Matrouk, A. Al-Hasanat, Z. A alqadi, H. Al-Shalabi (2013), Improving Matrix Multiplication Using Parallel Computing, International Journal on Information Technology (I.RE.I.T.) Vol. 1, N. 6 ISSN 2281-2911. [29]. Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPTION-DECRYPTION, International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016. [30]. Z.A. Alqadi, A. Abu-Jazar (2005), Analysis of Program Methods Used for Optimizing Matrix Multiplication, Journal of Engineering, vol. 15 n. 1, pp. 73-78. [31]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh: A Novel Based On Image Blocking Method to Encrypt-Decrypt Color JOIV: International Journal on Informatics Visualization, 2019. [32]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub and Mazen Abu-Zaher: A Novel Zero-Error Method to Create a Secret Tag for an Image; Journal of Theoretical and Applied Information Technology 15th July 2018. [33]. Jamil Al Azzeh, Ziad Alqadi Qazem, M. Jabber: Statistical Analysis of Methods Used to Enhanced Color Image Histogram; XX International Scientific and Technical Conference; Russia May 24-26, 2017. [34]. Jamil Al Azzeh, Hussein Alhatamleh, Ziad A. Alqadi, Mohammad Khalil Abuzalata: Creating a Color Map to be used to Convert a Gray Image to Color Image; International Journal of Computer Applications (0975 – 8887). Volume 153 – No2, November 2016. [35]. Khaled Matrouk, Abdullah Al- Hasanat, Haitham Alasha'ary, Ziad Al-Qadi, Hasan Al-Shalabi Analysis of Matrix Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue.3, March- 2019, pg. 76-90. [36]. Mohammed Abuzalata; Ziad Alqadi, Jamil Al-Azzeh; Qazem Jaber Modified Inverse LSB Method for Highly Secure Message Hiding: International Journal of Computer Science and Mobile Computing, Vol.8 Issue.2, February- 2019, pg. 93-103. © 2023, IJCSMC All Rights Reserved 36 Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.2, February- 2023, pg. 26-37 [37]. Qazem Jaber Rashad J. Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil Al-Azzeh; Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation: International Journal of Computer Science and Mobile Computing, Vol.8 Issue.2, 2019/3. [38]. Jamil Al-Azzeh, Ziad Alqadi, Mohammed Abuzalata; Performance Analysis of Artificial Neural Networks used for Color Image Recognition and Retrieving: International Journal of Computer Science and Mobile Computing, Vol.8 Issue.2, February- 2019. [39]. Rashad J. Rasras, Mohammed Abuzalata; Ziad Alqadi; Jamil Al-Azzeh; Qazem Jaber, Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation International Journal of Computer Science and Mobile Computing, Vol.8 Issue.3, March- 2019, pg. 14-26. [40]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh; A Novel Based on Image Blocking Method to Encrypt-Decrypt Color; INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION VOL 3, (2019). [41]. B. Zahran, J. AL-Azzeh, Z. Al Qadi, M. Al Zoghoul and S. Khawatreh, “A MODIFIED LBP METHOD TO EXTRACT FEATURES FROM COLOR IMAGES", Journal of Theoretical and Applied Information Technology(JATIT), Vol.96. No 10, 2018. [42]. J. AL-AZZEH, B. ZAHRAN, Z. ALQADI, B. AYYOUB, M. ABU-ZAHER, "A novel Zero-error Method to Create a Secret Tag for an Image", Journal of Theoretical and Applied Information Technology(JATIT), Vol.96. No 13, 2018.pp: 4081-4091. [43]. J. AL-AZZEH, B. ZAHRAN, Z. ALQADI," Salt and Pepper Noise: Effects and Removal", International Journal on Informatics Visualization, Vol.2. No 4, 2018.pp: 252-256. [44]. Jihad Nader, Ziad Alqadi, Bilal Zahran, "Analysis of Color Image Filtering Methods", International Journal of Computer Applications (IJCA), Volume 174, issue 8, 2017, pp:12-17. [45]. Ziad Alqadi, Bilal Zahran, Jihad Nader, " Estimation and Tuning of FIR Low pass Digital Filter Parameters", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 2, 2017, pp:18-23. [46]. Khaled Aldebei, Mua’ad M. Abu-Faraj, Ziad A. Alqadi, Comparative Analysis of Fingerprint Features Extraction Methods, Journal of Hunan University Natural Sciences, vol. 48, issue 12, pp. 177-182, 2022. [47]. Dr. Mohamad Barakat Prof. Ziad Alqadi, Highly Secure Method for Secret Data Transmission, International Journal of Scientific Engineering and Science, vol. 6, issue 1, pp. 49-55, 2022. [48]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022, doi.org/10.3390/sym14040664. [49]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022, doi.org/10.18280/ts.390117. [50]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance: Fingerprint Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6, pp. 685-694, 2021, doi:10.35741/issn.0258-2724.56.6.61. [51]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Extraction Methods,” Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021. [52]. M. Abu-Faraj, and Z. Alqadi, “Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no. 12, pp. 648-656, 2021, doi: 10.22937/IJCSNS.2021.21.12.89. [53]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Methods for Data Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12, pp. 451-458, 2021, doi:10.22937/IJCSNS.2021.21.12.61. [54]. M. Abu-Faraj, and Z. Alqadi, “Using Highly Secure Data Encryption Method for Text File Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12, pp. 53-60, 2021, doi:10.22937/IJCSNS.2021.21.12.8. © 2023, IJCSMC All Rights Reserved 37