scispace - formally typeset
Search or ask a question
Author

Yahya Al-Nabhani

Bio: Yahya Al-Nabhani is an academic researcher from Information Technology University. The author has contributed to research in topics: The Internet & Filter (signal processing). The author has an hindex of 3, co-authored 5 publications receiving 241 citations.

Papers
More filters
Posted Content
TL;DR: A three algorithm of multimedia encryption schemes have been proposed in the literature and description and aimed at achieving an efficiency, flexibility and security, which is a challenge of researchers.
Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. , which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question. Cryptography considers one of the techniques which used to protect the important information. In this paper a three algorithm of multimedia encryption schemes have been proposed in the literature and description. The New Comparative Study between DES, 3DES and AES within Nine Factors achieving an efficiency, flexibility and security, which is a challenge of researchers.

169 citations

Journal ArticleDOI
TL;DR: Experimental results reveal that the proposed watermarking algorithm yields watermarked images with superior imperceptibility and robustness to common attacks, such as JPEG compression, rotation, Gaussian noise, cropping, and median filter.
Abstract: Digital watermarking, which has been proven effective for protecting digital data, has recently gained considerable research interest. This study aims to develop an enhanced technique for producing watermarked images with high invisibility. During extraction, watermarks can be successfully extracted without the need for the original image. We have developed discrete wavelet transform with a Haar filter to embed a binary watermark image in selected coefficient blocks. A probabilistic neural network is used to extract the watermark image. To evaluate the efficiency of the algorithm and the quality of the extracted watermark images, we used widely known image quality function measurements, such as peak signal-to-noise ratio (PSNR) and normalized cross correlation (NCC). Results indicate the excellent invisibility of the extracted watermark image (PSNR=68.27dB), as well as exceptional watermark extraction (NCC=0.9779). Experimental results reveal that the proposed watermarking algorithm yields watermarked images with superior imperceptibility and robustness to common attacks, such as JPEG compression, rotation, Gaussian noise, cropping, and median filter.

61 citations

Proceedings ArticleDOI
09 Jul 2010
TL;DR: The aim of the proposed system is to hide information ( data file) after end of header file within execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process.
Abstract: A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses; secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) after end of header file within execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.

20 citations

Posted Content
TL;DR: The UML diagrams has been proposed to illustrate the design phase for any banking system, and two types of architecture which is used for the Internet Banking System are presented.
Abstract: Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is used for the Internet Banking System.

3 citations

Posted Content
TL;DR: This paper will present Dissertations Repository System Using Context Module to allow the students to benefit the dissertations which is in the library flexibly.
Abstract: Without a doubt, the electronic learning makes education quite flexible. Nowadays, all organizations and institutions are trying to avoid Monotony and the delay and inertia. As well the universities should be improving their systems continually to achieve success. Whereas, the students need to access the dissertations in the library. In this paper we will present Dissertations Repository System Using Context Module to allow the students to benefit the dissertations which is in the library flexibly.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Managing the Flow of Technology: Technology Transfer and the Dissemination of Technological Information Within the R&D Organization is summarized, showing how human and organizational systems could be restructured to bring about improved productivity and better person-to-person contact.
Abstract: The original edition of this book summarized more than a decade of work on communications flow in science and engineering organizations, showing how human and organizational systems could be restructured to bring about improved productivity and better person-to-person contact. While many studies have been done since then, few of them invalidate the general conclusions and recommendations Allen offers. In a new preface he points out new developments, noting areas that need some modification, elaboration, or extension, and directing readers to the appropriate journal articles where the findings, are reported. The first three chapters provide an overview of the communication system in technology, present the author's research methods, and describe differences in the career paths and goals of engineers and scientists that cause special problems for organizations. The book then discusses how technological information is acquired by the R & D organization, shows how critical technical communication within the laboratory is for R & D performance, and originates the idea of the \"gatekeeper,\" the person who links his or her organization to the world at large. Concluding chapters take up the influence of formal and informal organization and of architecture and office layouts on communication. Many of these ideas have been successfully incorporated by architects and managers in the design of new R & D facilities and complexes. Suggested Citation Handle: RePEc:mtp:titles:0262510278 Download reference as HTML Thomas J. Allen, 1984. \"Managing the Flow of Technology: Technology Transfer and the Dissemination of Technological Information Within the R&D Organization,\" MIT Press Books, The MIT Press, edition 1, volume 1, number 0262510278, November. More services and features MyIDEAS Follow serials, authors, keywords & more New papers by email Subscribe to new additions to RePEc Author registration Public profiles for Economics researchers MPRA Upload your paper to be listed on RePEc and IDEAS EconAcademics Blog aggregator for economics research Plagiarism Cases of plagiarism in Economics Rankings Various rankings of research in Economics & related fields RePEc Genealogy Who was a student of whom, using RePEc RePEc Biblio Curated articles & papers on various economics topics Job market papers RePEc working paper series dedicated to the job market Fantasy league Pretend you are at the helm of an economics department Services from the StL Fed Data, research, apps & more from the St. Louis Fed IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.

597 citations

Journal ArticleDOI
TL;DR: A survey of various Encryption Algorithms is presented and it is shown that the art of cryptography has become more complex in order to make information more secure.
Abstract: Encryption is the process of scrambling a message so that only the intended recipient can read it. Encryption can provide a means of securing information. As more and more information is stored on computers or communicated via computers, the need to insure that this information is invulnerable to snooping and/or tampering becomes more relevant. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. Information Confidentiality has a prominent significance in the study of ethics, law and most recently in Information Systems. With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure. Arrays of Encryption systems are being deployed in the world of Information Systems by various organizations. In this paper, a survey of various Encryption Algorithms is presented. General Terms Information Security, Encryption

323 citations

Journal ArticleDOI
TL;DR: Cost and performance of popularly used cryptographic algorithms DES, 3DES, AES, RSA, RSA and blowfish are implemented and analyzed in detail to show an overall performance analysis, unlike only theoretical comparisons.

207 citations

Journal ArticleDOI
TL;DR: A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
Abstract: The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users’ entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher’s interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.

153 citations

Journal ArticleDOI
TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Abstract: Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.

126 citations