Lightweight Image Encryption Using Chacha20 and Serpent Algorithm DOI Creative Commons
Hayder Najm, Mohammed Salih Mahdi,

Wijdan Rashid Abdulhussien

et al.

Journal of Internet Services and Information Security, Journal Year: 2024, Volume and Issue: 14(4), P. 436 - 449

Published: Nov. 30, 2024

Data security is prominent today primarily due to the numerous applications of digital images in contemporary world. Innovations lightweight encryption are being perceived as solutions that would allow enhancing levels protection while incurring minimal impact on size data and speed processes. The having lower complexities a good choice different suites, namely, cloud computing systems using social networks for communication. All users will not have worry about their hacked when sharing images. This paper presents new image technique utilizes ChaCha20 keys generator with 16-round Serpent algorithm provide process. analysis findings indicate suggested cipher capable withstanding both known chosen plaintext attacks. Additionally, it exhibits high degree unpredictability, significant level security, strong sensitivity key variations. assessment methods done assistance equipment through histogram analysis, entropy calculation, correlation mean squared error measurement, peak signal-to-noise ratio unified average change intensity assessment, normalized pixel difference rate structural similarity index. As stated by experimental results, proposed method performs very well adopted various measuring instruments, value information equals 7.98, which nearly equivalent perfect 8. In addition, obtained greater than 99.55%, changing equal 30.11. has been mentioned, decryption process can work well.

Language: Английский

Secure Chaos of 5G Wireless Communication System Based on IOT Applications DOI Open Access
Haider TH. Salim ALRikabi, Hussein Tuama Hazim

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2022, Volume and Issue: 18(12), P. 89 - 105

Published: Sept. 14, 2022

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A model will fulfilling needs customers simultaneously gives huge investment funds item cost convenience was presented this paper. perform steering, planned geography virtualized climate. We customized CHAOS network flood board goes about as consistent northward API directing. Network infused dynamically from 1MB up 10MB (connect b/w) progressive way similar 10 occurrences. In conclusion, performed applying control hypothetical method assistance calculations. By looking two situations, noticed prominent distinction throughput controlling application MANETs. data refreshed after clockwork.

Language: Английский

Citations

69

Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques DOI Open Access
Abdul Hadi M. Alaidi,

Roa’a M. Al airaji,

Haider TH. Salim ALRikabi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2022, Volume and Issue: 16(10), P. 122 - 139

Published: May 24, 2022

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The content on the dark constantly updated and changed. collection classification such illegal are challenging tasks, as they time-consuming. This problem has in recent times emerged an issue requires quick attention from both industry academia. To this end, efforts have been made article crawler capable collecting pages, cleaning them, saving them document database, proposed. carries automatic gathered pages into five classes. classifiers used classifying include Linear Support Vector Classifier (SVC), Naïve Bayes (NB), Document Frequency (TF-IDF). experimental results revealed accuracy rate 92% 81% were achieved SVC NB, respectively.

Language: Английский

Citations

63

Malaria parasite detection using deep learning algorithms based on (CNNs) technique DOI

Muqdad Hanoon Dawood Alnussairi,

Abdullahi Abdu İbrahim

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 103, P. 108316 - 108316

Published: Sept. 1, 2022

Language: Английский

Citations

44

Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN DOI Open Access
Haider TH. Salim ALRikabi,

Ibtisam A. Aljazaery,

Jaafar Sadiq Qateef

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2022, Volume and Issue: 16(08), P. 34 - 48

Published: April 26, 2022

The past few years have witnessed a huge increase in the application of facial recognition, detection, and analysis technology. However, face recognition systems remain most popular among general public. system can detect presence when exposed to one. accuracy fairness that be derived from such necessitate their use, because humans, particularly security personnel tired target wrong person as suspect. artificial intelligence are properly trained capable efficiently identifying classifying faces without errors. In this work, use Matlab language was employed building software is recognizing differentiating different patterns. proposed equipped with camera serves practical aspect captures shots sent theoretical part special program designed recognize by comparing them database stored within program. work involved Quantum Neural Network. training dataset made up features vectors were obtained well-known set images people. Here, Principle Component Analysis (PCA) used for extraction feature then prepared next step. experimental results revealed efficient achieved through well-trained

Language: Английский

Citations

43

Computational Thinking (CT) Among University Students DOI Open Access
Ban Hassan Majeed,

Lina Fouad Jawad,

Haider TH. Salim ALRikabi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2022, Volume and Issue: 16(10), P. 244 - 252

Published: May 24, 2022

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms content, computational thinking involves problems, studying data patterns, deconstructing using algorithms and procedures, doing simulations, computer modeling, reasoning about abstract things. However, there a lack studies dealing with it its skills that can be developed utilized field information technology used learning teaching. The descriptive research method was used, test tool prepared to measure level consisting (24) items type multiple-choice "CT". study group consists (100) third-year students at University Baghdad Computer Science within scope (2020-2021). results are detailed.

Language: Английский

Citations

43

Automated Cheating Detection based on Video Surveillance in the Examination Classes DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2022, Volume and Issue: 16(08), P. 124 - 137

Published: April 26, 2022

A major issue in the field of education is exam malpractice and other forms academic dishonesty, where efforts made towards assessment students are undercut. In order to address this menace, a cheating detection system has been proposed study. The can detect real-time. uses video surveillance monitor activities student during exams, especially abnormal behavior. development involved use three different techniques, with functions. first technique helps determining direction students’ heads when they move from their initial direction, which script. Some form involves peeping at scripts people writing same exam. Whenever observes deviation that exceeds set threshold, it classifies behavior as abnormal. second works movement student’s iris. It detects iris moves copy answers written documents like mobile phones, books, hands, summary papers. third used identifying contact between hands face, well for shared students, such sharing incriminating materials. When any these detected, an automatic alarm alerts authority about thereby minimizing error rate occur result manual monitoring.

Language: Английский

Citations

29

Secured Transfer and Storage Image Data for Cloud Communications DOI Open Access
Mohammad K. Abdul-Hussein, Haider TH. Salim ALRikabi

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2023, Volume and Issue: 19(06), P. 4 - 17

Published: May 16, 2023

In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing among several users is a difficult issue in communication. Cryptography and steganography techniques for storage address data security challenges. This paper presents novel method securely encrypting image transmission link exchange with service. There two phases accomplish the encryption process, first phase encrypts file by XORing it random key that generated new hybrid chaotic map. The second converts encrypted format audio add another layer improve secure transfer. using map has benefit having more than 10256 spaces necessary level security. Based on statistical analysis encryption, quality evaluated criteria, results demonstrate algorithm's ability resist

Language: Английский

Citations

21

Gender Recognition of Human from Face Images Using Multi-Class Support Vector Machine (SVM) Classifiers DOI Open Access
Mohammed Jawad Al Dujaili, Haider TH. Salim ALRikabi, Nisreen Khalil Abed

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(08), P. 113 - 134

Published: April 26, 2023

In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering several uses it has in security, web search, human-computer interactions, etc., from facial photos garnered lot attention. The need to use enhance techniques felt more strongly today due significant development design systems. Relatively speaking other approaches, progress gained this area thus far not exceptional. Thus, novel method been adopted study improve accuracy comparison earlier research. To create best rate efficiency suggested research, we choose minimal set characteristics. Testing on FERET UTK-Face datasets reveals that our algorithm lower degree inaccuracy. article, input image person's face pre-processed extract right features once recognized. Gender separation achieved using Multi-class Support Vector Machine (SVM) Classifiers after normalized images have extracted Histogram Oriented Gradient (HOG), Gabor Filters, Speeded Up Robust Features (SURF), as well their combination select most appropriate feature them for classification. As reduction feature, Principal Component Analysis (PCA) also employed. Using proposed approach, 98.75% precision accomplished database runtime performance 0.4 Sec. database, 97.43% 0.5

Language: Английский

Citations

19

the Finger Vein Recognition Using Deep Learning Technique DOI Creative Commons

Sahar Wahab khadim,

Hussain K. Ibrahim,

Ameen Majid Shadhar

et al.

Wasit Journal of Computer and Mathematics Science, Journal Year: 2022, Volume and Issue: 1(2), P. 1 - 7

Published: June 30, 2022

Finger vein biometrics have gained a lot of attention in recent years because they offer the perfect balance security and economic viability, with advantages such as being least susceptible to identity theft veins are present beneath skin, unaffected by ageing person, etc. All these factors make it necessary create functioning models meet ever-increasing need for security. The use facial recognition AI-based biometrics, particularly law enforcement, has become hot topic its inadvertent demographic bias. Biometric bias, on other hand, far-reaching consequences that extend into daily cases. When an ATM transaction or online banking is compromised false positive negative verification, fraudulent activity made easier. study this research work focused difficulty determining fingertip. On two widely used freely available datasets finger veins, we applied deep convolutional neural network feature extraction. gotten interest recently novel biometric technique. might benefit from applying learning, end-to-end approach shown promising results sectors like face target detection.

Language: Английский

Citations

22

Enhancing Educational Certificate Management and Verification with Blockchain Technology DOI
B. Viswanathan,

B. Lakshmi

Journal of Computer Information Systems, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 15

Published: Feb. 12, 2025

Language: Английский

Citations

0