Preferred Language
Articles
/
ijs-609
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) in an effort to strengthen the security and randomness of the original Rivest Cipher 5 (RC5) algorithm.

The results show that the proposed PRNGs based on CA can generates RNS with a high period which can reach to more than 100,000 keys without repetition or string duplication. Moreover, the tests demonstrates that the proposed ERC5 improves the security of the original RC5 algorithm. The proposed cryptosystem is evaluated in terms of Shannon theory of information entropy, randomness tests, computation time and key space analysis. The results verify that the suggested audio crypto-system increases the growth of the security level of original RC5 encryption algorithm with high degree of randomness and confidentiality.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

Scopus Crossref
View Publication
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Simulation of one Dimensional Photoacoustic Imaging

The present work provides theoretical investigation of laser photoacoustic one dimensional imaging to detect a blood vessel or tumor embedded within normal tissue. The key task in photoacoustic imaging is to have acoustic signal that help to determine the size and location of the target object inside normal tissue. The analytical simulation used a spherical wave model representing target object (blood vessel or tumor) inside normal tissue. A computer program in MATLAB environment has been written to realize this simulation. This model generates time resolved acoustic wave signal that include both expansion and contraction parts of the wave. The photoacoustic signal from the target object is simulated for a range of laser pulse duration 1

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
View Publication Preview PDF