scispace - formally typeset
Search or ask a question
Author

Marwah Kamil Hussein

Bio: Marwah Kamil Hussein is an academic researcher from University of Basrah. The author has contributed to research in topics: Encryption & Steganography. The author has an hindex of 3, co-authored 7 publications receiving 16 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This research tries to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR), correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI).
Abstract: One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.

6 citations

Journal ArticleDOI
01 Jul 2019
TL;DR: The proposed new partial encryption schemes use a secure encryption algorithm to encrypt only part of the compressed data, resulting in a significant reduction of time in the stage of encryption and decryption.
Abstract: The proposed new partial encryption schemes use a secure encryption algorithm to encrypt only part of the compressed data. After application of image compression algorithm the partial encryption will applied. For two pairs of different gray scale images with the size (256 ´ 256) pixels, only 0.0244%-25% of the original data is encrypted. As a result, we see a significant reduction of time in the stage of encryption and decryption.In the compression step, the Orthogonal Search Algorithm (OSA) for motion estimation (the different between stereo images) is used. The resulting disparity vector and the remaining image were compressed by Discrete Cosine Transform (DCT), Quantization and arithmetic encoding. The image compressed was encrypted by RSA algorithm. The decoded images then compared with the original images.Good results showed in the experimental results of Peak Signal-to-Noise Ratio (PSNR), Compression Ratio (CR) and processing time. The proposed schemes of partial encryption are fast, secure and not be reducing in compression performance of the selected compression methods.

6 citations

Journal Article
TL;DR: In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a portion of compressed data and the encryption and decryption time has been reduced considerably.
Abstract: In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a portion of compressed data. Only 10% -25% of the output is encrypted from the Quad tree compression algorithm. As a result, the encryption and decryption time has been reduced considerably. Thus, in the compression stage, the Quad tree compression algorithm is used while in the encoding stage, the Advanced Encryption Standard (AES) algorithm is applied. The proposed partial coding system is fast and safe and does not reduce the compression performance of the underlying specific algorithm.

4 citations

Proceedings ArticleDOI
01 Jun 2020
TL;DR: Using the RC4 algorithm in the transmission model in the telephone network can achieve greater privacy in telephone calls communication without affecting the sound quality through the two encryption keys controlled by both ends connection.
Abstract: Encryption plays a major role in achieving privacy, especially in communications and information systems such as military systems, banks, telecommunications and individuals, and in mobile phone networks in particular. The (GSM) standard provides a level of privacy that may not be sufficient for some users, as this study is presented a proposed system for applying audio coding in cellular communication networks from the beginning (mobile) to the end (mobile (via the standard mobile communications system) GSM), and in this standard is used the A5 algorithm for audio coding is only for transmitting stations, while for the rest of the network it is without transmitting coding the data as it is, so we in this study proposed the application of RC4 algorithm with A5 algorithm through encryption keys controlled by the sender and receiver in audio coding from start to finish to ensure complete encryption and privacy in network phone calls and the tool used in this the research is a matlab program to create a simulated environment for the transmission between the sender and the receiver to add the RC4 algorithm for these stages and one of the results of the study using the RC4 algorithm in the transmission model in the telephone network can achieve greater privacy in telephone calls communication without affecting the sound quality through the two encryption keys controlled by both ends connection.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a double image encryption algorithm based on convolutional neural network (CNN) and dynamic adaptive diffusion, which not only ensures the security of double image but also improves the encryption efficiency and reduces the possibility of being attacked.
Abstract: To realize the secure transmission of double images, this paper proposes a double image encryption algorithm based on convolutional neural network (CNN) and dynamic adaptive diffusion. This scheme is different from the existing double image encryption technology. According to the characteristics of digital image, we design a dual-channel (digital channel / optical channel) encryption method, which not only ensures the security of double image, but also improves the encryption efficiency and reduces the possibility of being attacked. First, a chaotic map is used to control the initial values of the 5D conservative chaotic system to enhance the security of the key. Secondary, in order to effectively resist known-plaintext attack and chosen-plaintext attack, we employ a chaotic sequence as convolution kernel of convolution neural network to generate plaintext related chaotic pointer to control the scrambling operation of two images. On this basis, a novel image fusion method is designed, which splits and fuses two images into two different parts according to the amount of information contained. In addition, a dual-channel image encryption scheme, optical encryption channel and digital encryption channel, is designed for the two parts after fusion. The former has better parallelism and higher encryption efficiency, while the latter has higher computational complexity and better encryption reliability. Especially in the digital encryption channel, a new dynamic adaptive diffusion method is designed, which is more flexible and secure than the existing encryption algorithm. Finally, numerical simulation and experimental analysis verify the feasibility and effectiveness of the scheme.

70 citations

Journal ArticleDOI
TL;DR: Simulation results ensure that the presented architecture is an efficient method for enciphering the video information, and the presented approach has superiority over the other schemes when the speed of encryption and processing of data are taken into consideration.
Abstract: Media streaming falls into the category of Big Data. Regardless of the video duration, an enormous amount of information is encoded in accordance with standardized algorithms of videos. In the transmission of videos, the intended recipient is allowed to receive a copy of the broadcasted video; however, the adversary also has access to it which poses a serious concern to the data confidentiality and availability. In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the information from malicious intruders. However, in order to utilize fewer system resources, video information is compressed before its encryption. Various compression algorithms such as Discrete Cosine Transform, Integer Wavelet transforms, and Huffman coding are employed to reduce the enormous size of videos. moving picture expert group is a standard employed in video broadcasting, and it constitutes of different frame types, viz., I, B, and P frames. Later, two frame types carry similar information as of foremost type. Even I frame is to be processed and compressed with the abovementioned schemes to discard any redundant information from it. However, I frame embraces an abundance of new information; thus, encryption of this frame is sufficient enough to safeguard the whole video. The introduction of various compression algorithms can further increase the encryption time of one frame. The performance parameters such as PSNR and compression ratio are examined to further analyze the proposed model’s effectiveness. Therefore, the presented approach has superiority over the other schemes when the speed of encryption and processing of data are taken into consideration. After the reversal of the complete system, we have observed no major impact on the quality of the deciphered video. Simulation results ensure that the presented architecture is an efficient method for enciphering the video information.

6 citations

Journal ArticleDOI
TL;DR: An algorithm U-Net Architecture is proposed to solve the problem of semantic segmentation of aerial images, which does not give precise details of the remote sensing images due to the low resolution of the aerial images.
Abstract: Arial images are very high resolution. The automation for map generation and semantic segmentation of aerial images are challenging problems in semantic segmentation. The semantic segmentation process does not give us precise details of the remote sensing images due to the low resolution of the aerial images. Hence, we propose an algorithm U-Net Architecture to solve this problem. It is classified into two paths. The compression path (also called: the encoder) is the first path and is used to capture the image’s context. The encoder is just a convolutional and maximal pooling layer stack. The symmetric expanding path (also called: the decoder) is the second path, which is used to enable exact localization by transposed convolutions. This task is commonly referred to as dense prediction, which is completely connected to each other and also with the former neurons which gives rise to dense layers. Thus it is an end-to-end fully convolutional network (FCN), i.e. it only contains convolutional layers and does not contain any dense layer because of which it can accept images of any size. The performance of the model will be evaluated by improving the image using the proposed method U-NET and obtaining an improved image by measuring the accuracy compared with the value of accuracy with previous methods.

6 citations

Journal Article
TL;DR: In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a portion of compressed data and the encryption and decryption time has been reduced considerably.
Abstract: In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a portion of compressed data. Only 10% -25% of the output is encrypted from the Quad tree compression algorithm. As a result, the encryption and decryption time has been reduced considerably. Thus, in the compression stage, the Quad tree compression algorithm is used while in the encoding stage, the Advanced Encryption Standard (AES) algorithm is applied. The proposed partial coding system is fast and safe and does not reduce the compression performance of the underlying specific algorithm.

4 citations