International Journal of Computer Science and Mobile Computing (IJCSMC), 2025
An efficient method of audio file cryptography will be introduced, the method will decrease both ... more An efficient method of audio file cryptography will be introduced, the method will decrease both the encryption and decryption times comparing with other existing methods, the method will speed up the process of audio file cryptography. The introduced method will use a variable number of rounds for audio file cryptography, each round will use a block size, number of blocks and generated indices keys, these parameters will be variable and change from round to another. The private key will have a variable length, and it will depend on the selected number of rounds (192 bits for each round), this length will be good enough to produce a huge key space capable to resist hacking attacks, the produced decrypted file will be very sensitive to the selected values of the private key. The introduced method will be simple and easy to implement, it will use a simple chaotic logistic map model to generate the required for each round indices key. The introduced method will use a simple substitution operation to apply audio file samples substitution without altering the samples values and without using any extra logical and arithmetic operations (required for other existing methods). The introduced method will be tested and implemented using mat lab; the obtained results will be used to show that the method will satisfy the requirements of good crypto method.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
A new efficient method of secret message steganography will be introduced; the method will use an... more A new efficient method of secret message steganography will be introduced; the method will use an image-block as a covering-stego media, this block will be secret and it will be determined by the selected private key. The image-block will be substituted before message hiding-extracting, and it will be substituted back after message hiding. The method will provide a high security level to protect the hidden message, the private key will have a length of 384 bits, this length will be good enough to provide a huge key space capable to resist hacking attacks, the extracted message will be very sensitive to the selected values of the private, any changes in the private key in the extraction phase will be considered as a hacking attempt by producing a damaged unreadable message. The private key will be used to select the secret image-block and to generate two indices keys, which are required to apply image-block rows and column substitution. The indices key will be obtained by running two simple chaotic logistic map models. The proposed method will use inconsecutive and separate covering-stego bytes and the process of message bits hiding will be applied in batch way by performing a single replacement operation. The proposed method will be implemented using various messages and various covering images, the obtained results will be used to prove the enhancements provided by this method in the quality and speed of message steganography.
International journal of computer science and mobile computing, Jun 30, 2024
A simple three rounds method of message cryptography will be introduced, the message will be encr... more A simple three rounds method of message cryptography will be introduced, the message will be encrypted-decrypted by apply XORing operation of the message with the secret KEY1 in the first round, in the second round the message will be shuffled using the secret key KEY2, while in the third round the message binary matrix will be rotated left to a number of selected digits. The introduced method will be very secure it will use a secret kept digital color image as an image_key, this image will be used to generate KEY1 and KEY2. KEY1 will be extracted from the image from a selected position, while KEY2 will be an indices key obtained by sorting a number of bytes extracted from the image from another position determined by the user. In addition to the image_key the method will use the values of POS1, POS2, and NORLD to determine the starting position of key1, the starting position of key2 and the number of rotate left digits. The produced decrypted message will be very sensitive to the selected image_key, POS1, POS2 and NORTD. The encryption function will be simplified and it will be implemented using three simple tasks: XORing, shuffling and rotating left, while the decryption function will be implemented by applying rotate left, shuffling back and XORing operations. The proposed method will be implemented and tested using various messages, the results will be studied and analyzed to prove the achievements provided by the method in: quality, speed, security and sensitivity.
International journal of computer science and mobile computing, Apr 30, 2024
Chaotic logistic map is a good model which can be used to generate various secret keys used in da... more Chaotic logistic map is a good model which can be used to generate various secret keys used in data cryptography. In this paper research a detailed analysis of CLM will be introduced. The behavior of CLM will be studied to show how to select the best values of the CLM parameters (growth rate, initial population and the length of the population). Various ranges of the population growth and the initial population will be tested. It will be shown how to use the generated populations to form various secret keys. The sensitivity of CLM will be studied, and it will be shown that any minor changes in the CLM parameters will lead to change the generated population. The population generation time will be tested using various in length generated population, and some recommendation will be provided when dealing with data with big size. It will be shown that using CLM will provide a good security level when using the CLM parameters as a private key.
International journal of computer science and mobile computing, Feb 28, 2024
An efficient method of message steganography will be proposed, the method will use 8 bits from th... more An efficient method of message steganography will be proposed, the method will use 8 bits from the speech sample binary value to hold one character from the secret message, thus the capacity hiding will equal the covering DSF size. Using lower LSBs of the speech sample binary value will not much affect the sample value, so the quality of the stego DSF will be excellent and the stego file will be closed to the covering file. The proposed method will add an extra security issues by using a private key, this key will be used to calculate the starting sample where to start characters hiding, it will determine the starting LSB to get the set of 8 LSBs, and it will be also used to generate eight element chaotic key, this key will be converted to 8 orders of LSBs to hide the bits of characters, these bit will be not consecutive. The PK will a long enough long provide a good key space capable to resist hacking attempt and the extracted message will be very sensitive to the selected values of the private key. The proposed method will provide enhancements in the quality, security, speed and sensitivity of message steganography, these enhancements will be proved based on the discussing of obtained experimental results.
International journal of computer science and mobile computing, Jan 29, 2024
High quality of the stego media is an important issue to evaluate the stego system, the stego med... more High quality of the stego media is an important issue to evaluate the stego system, the stego media must be closed to the covering one and the MSE measured between them must be low as possible, while the PSNR measured between them must be high as possible. In this paper research a detailed analysis of stego media will be produced, the quality of digital color image will be compared with the quality of digital speech file. Digital color image will be used to hold various messages, the same messages will be hidden in a digital speech file, and the quality parameters will be calculated. The results of using the image will be compared with the results of using digital speech file to raise some recommendation. 2 and 4 bits for message hiding will be tested using short, medium and long messages.
International journal of computer science and mobile computing, Dec 29, 2023
A simple and secure method of digital color image steganography method will be introduced, the me... more A simple and secure method of digital color image steganography method will be introduced, the method will hide a digital color image in another image, the covering image will be any type and with any size (the covering image can be smaller than the image to be hidden, thus the capacity of the covering image will be unlimited. The proposed method will apply image resizing, the resizing factors will form the private key to protect the hidden image from being hacked, this key will provide a good key space to secure the image, the extracted image will be very sensitive to the selected values of the private key components. A simple way of image bits hiding and extracting operation will be used, the image bit matrix will converted to one column matrix and embedded in the LSBs of the covering bytes using one assignment operation, the LSBs of the stego bytes will extracted using one operation to create a one column matrix, which will be converted to 8 columns matrix to form the image binary matrix. The method will be implemented and tested using various covering images and various color images to be hidden. The obtained results will be analyzed to prove the quality, speed and sensitivity of the proposed method.
International journal of computer science and mobile computing, Dec 29, 2023
A high speed and highly secure method of image cryptography will be introduced. The introduced me... more A high speed and highly secure method of image cryptography will be introduced. The introduced method will decrease the encryption time and increase the throughput of image cryptography, and it will have a significant speed up comparing with other existing methods of data cryptography. The introduced method will use a complicated private key, which will provide a huge key space to resist hacking attacks, and the generated images will be very sensitive to the selected values of the private key. The private key will use two chaotic logistic map models and one chaotic tent map model to generate three 2D chaotic keys, these keys will be converted to integers and resized to match the size of the image. The quality of the proposed method will be tested to insure that the introduced method will always produce an encrypted image with low quality and a decrypted image with high quality, the quality parameters calculated between the source images and the encrypted and decrypted images will be calculated to prove that the method will satisfy the quality requirements of good cryptography.
International journal of computer science and mobile computing, Nov 29, 2023
Many introduced methods for text data cryptography are suffering from some disadvantages such as:... more Many introduced methods for text data cryptography are suffering from some disadvantages such as: short and fixed length private key, fixed data block size, fixed and big number of rounds, sub keys generation and low throughput. In this research paper a new method of data cryptography process will be introduced, it will be shown that this method will suit cryptography of text messages with any length (short, medium and very long messages. The proposed method will raise the level of security providing a high degree of data protection by using a complicated variable length two dimensional matrix key, this key will be generated based on chaotic tenet map model, the block size and the number of rounds will be included in the chaotic tent map parameters allowing 1D and 2D keys generation. The proposed method will be tested using various text messages, the method throughput will be calculated, and also the messages quality during the encryption and decryption phases will be measured to insure that the proposed method achieves the required cryptography process enhancement. Several type of analysis will be performed to insure achieving the requirements of cryptography: increasing the quality of cryptography, increasing the throughput and increasing the level of security.
International journal of computer science and mobile computing, Jan 30, 2024
A novel method of digital speech file cryptography will be proposed. The method will apply speech... more A novel method of digital speech file cryptography will be proposed. The method will apply speech encryption-decryption at the bit level. The binary values of the speech samples will be shifted left to a defined number of rotating left digits. The private key will determine the length of the set of the bits to be rotated will be selected, the starting bit from where to start rotating and the number of rotating digits. The speech sample value will be represented in binary using 64_bits binary representation. Because of the fractional decimal value of the speech sample, changing the LSBs of the binary value may not affect the speech sample, so the starting bit for selecting the bits to be rotated will be investigated, and this bit will be used in the encryption-decryption process to get a damaged encrypted speech file. The private key will contains the starting bit; the bits set length and the number of rotating left digits, conditional selections of the private key value will be provided based on analyzing the quality of the encrypted speech files. The encryption and decryption process of the proposed method will be implemented in one round using a simple rotate left operation. The proposed method will not need key generation process; the values included in the private key will be directly used to apply speech encryption-decryption. The proposed method will be implemented using various speech files, the obtained results will be analyzed using quality, speed and sensitivity analysis to prove the efficiency of the proposed method.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
A highly secure method of message cryptography will be introduced, the method will use a complica... more A highly secure method of message cryptography will be introduced, the method will use a complicated PK, which will provide a high entropy space capable to resist hacking attempts, and the produced decrypted message will be very sensitive to the selected values of the PK components. The PK will be used to generate two chaotic keys; these keys will be converted to indices key to be used to reorder the message contents at the character level and at the bit level. The encryption-decryption process will be implemented in two rounds: the first round will be used to reorder the message characters, while the second round will be used to reorder the message blocks of bits. The PK will be also used to divide the message array of bits to equal blocks. The introduced method will simplify the process of message cryptography by applying simple reordering operations and eliminating the need to use a complex og logical operations used in other methods of message cryptography. The proposed method will be implemented and tested using various short, medium and long messages, the obtained results will be analyzed to prove the enhancements provided by the proposed method in: speed, quality and sensitivity of message cryptography.
International journal of computer science and mobile computing, Feb 28, 2024
The process of hiding confidential data is one of the important processes used to protect this da... more The process of hiding confidential data is one of the important processes used to protect this data from intruders or protect it from the penetration process. The most popular methods used in data steganography are LSB and LSB2 methods. These methods are efficient methods of data hiding, they provide a good stego media quality and good speed parameters. They are capable of hiding short and long secret messages. To increase the capacity and to decrease both the hiding and extraction times LSB4 method will be introduced and used. The proposed method will be implemented using various covering images and various in length secret messages, the obtained results will be analyzed to prove the quality and the speed of the proposed method. The obtained results of the proposed LSB4 method will be compared with the results of LSB method to show the enhancements provided by the proposed method. The proposed LSB4 method will be supplied by a security issues to protect the hidden message, the secret message will be protected by using a special private key to apply bits' substitution on the contents of characters' binary matrix.
International journal of computer science and mobile computing, Feb 28, 2024
Secret messages are the most circulated via communication environments digital data, these messag... more Secret messages are the most circulated via communication environments digital data, these messages may be secret, private, and the communication environment may unsafe, so they need protection from being hacked. In this paper research a simple method of message cryptography will be proposed, the method will use one round and simplified set of instruction to apply message encryption-decryption. The method will use a simple private key to determine the reshaping factor and the number of rotating left digits. The message binary matrix will be reshaped to a number of columns equal the reshaping factor, and each columns will be rotated left for a selected number of digits to apply message encryption-decryption. The reshaping factor will be tested to show the best choice of the reshaping factor, which will provide the best performance, the message length will be tested and some recommendations will be provided. The quality of the proposed method will tested by implementing various messages and examining the quality parameters values to prove that the proposed method will satisfy the quality requirements of good crypto system.
International journal of computer science and mobile computing, Jan 30, 2024
Digital speech file is an important widely circulated type needed to be protected from being hack... more Digital speech file is an important widely circulated type needed to be protected from being hacked. Data steganography is one of the easiest methods which can be used to protect the speech file. In this paper research the process of using each of the digital image or the digital speech as a covering media will be analyzes. LSB2 and LSB4 will be used for color images, while LSB32, LSB16, LSB8 and LSB4 will be used for a speech covering media, the quality of the obtained stego media will be analyzed to give the user the best choice of selecting the covering media foe digital speech hiding.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
A simple and efficient sequence of procedures to build an image recognition system will be propos... more A simple and efficient sequence of procedures to build an image recognition system will be proposed, this system will be easily used to classify any image, with any type and size. A procedure to create the image features database will be introduced, this procedure will be based on local binary patterns method, it will decrease the features extraction time and create a unique features array for each image, and this array will be used as an identifier to recognize the associated image. The second procedure will use a feedforward artificial neural network, the architecture of this ANN will be proposed and trained, the optimal ANN which minimize the mean square error between the targets and the calculated outputs, this ANN will be saved to be used in the image classification procedure. Several images will be selected, the features of each image will be extracted and save to create the image features database. This database with the required targets will used to train the ANN; various approaches will be discussed in order to achieve the optimal ANN. The created optimal ANN then will be used as a classification tool to identify the image using its features.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
A modified, secure and efficient LSB based method (MSE_LSB) of message steganography will be intr... more A modified, secure and efficient LSB based method (MSE_LSB) of message steganography will be introduced. The single character of the secret message will be hidden in spaced covering bytes. The covering-stego bytes will be reordered and scattered based on the contents of the generated secret indices key, this key will be used to reorder and reorder back the covering-stego bytes. The proposed MSE_LSB method will use a complicated private key, this key will provide a huge key space capable to make it strong enough to resist hacking attacks; the extracted message will be very sensitive to the selected private key. The secret indices key will be generated using chaotic logistic parameters for short and medium messages, and an image_key will be used to generate the indices key for long messages to keep the method efficient. The proposed method will modify and simplify the processes of characters hiding and extracting by using simple assignment operation. The image_key will replace the chaotic logistic key to reduce the key generation time, this is because long chaotic key will require a long time, thus the speed of message steganography will be negatively affected. The proposed MSE_LSB method will be tested and implemented using various short, medium and long messages, the obtained results will be used to prove the fact that the proposed method will meet the requirements of good stego system (quality, security, sensitivity and speed). The speed results of the proposed method will be compared with other methods speeds to show how the proposed method will increase the speed of message steganography by decreasing both the hiding and extracting times.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
A simple three rounds method of message cryptography will be introduced, the message will be encr... more A simple three rounds method of message cryptography will be introduced, the message will be encrypted-decrypted by apply XORing operation of the message with the secret KEY1 in the first round, in the second round the message will be shuffled using the secret key KEY2, while in the third round the message binary matrix will be rotated left to a number of selected digits. The introduced method will be very secure it will use a secret kept digital color image as an image_key, this image will be used to generate KEY1 and KEY2. KEY1 will be extracted from the image from a selected position, while KEY2 will be an indices key obtained by sorting a number of bytes extracted from the image from another position determined by the user. In addition to the image_key the method will use the values of POS1, POS2, and NORLD to determine the starting position of key1, the starting position of key2 and the number of rotate left digits. The produced decrypted message will be very sensitive to the selected image_key, POS1, POS2 and NORTD. The encryption function will be simplified and it will be implemented using three simple tasks: XORing, shuffling and rotating left, while the decryption function will be implemented by applying rotate left, shuffling back and XORing operations. The proposed method will be implemented and tested using various messages, the results will be studied and analyzed to prove the achievements provided by the method in: quality, speed, security and sensitivity.
International Journal of Electrical and Computer Engineering (IJECE), 2024
A novel method of message steganography is introduced to solve the disadvantages of traditional l... more A novel method of message steganography is introduced to solve the disadvantages of traditional least significant bit (LSB) based methods by dividing the covering-stego image into a secret number of blocks. A chaotic logistic map model was performed using the chaotic parameters and the number of image blocks for generating a chaotic key. This key was then sorted, and the locations of blocks 1 to 8 were used to select the required blocks to be used as covering-stego blocks. The introduced method simplifies the process of message bits hiding and extracting by adopting a batch method of bits hiding and extracting. A comparative analysis was conducted between the outcomes of proposed method and those of prevalent approaches to outline the enhancements in both speed and quality of message steganography.
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
Chaotic logistic map is a good model which can be used to generate various secret keys used in da... more Chaotic logistic map is a good model which can be used to generate various secret keys used in data cryptography. In this paper research a detailed analysis of CLM will be introduced. The behavior of CLM will be studied to show how to select the best values of the CLM parameters (growth rate, initial population and the length of the population). Various ranges of the population growth and the initial population will be tested. It will be shown how to use the generated populations to form various secret keys. The sensitivity of CLM will be studied, and it will be shown that any minor changes in the CLM parameters will lead to change the generated population. The population generation time will be tested using various in length generated population, and some recommendation will be provided when dealing with data with big size. It will be shown that using CLM will provide a good security level when using the CLM parameters as a private key.
WSEAS Transactions on Computers archive, Apr 1, 2011
In this paper the artificial neural network training algorithm is implemented in MATLAB language.... more In this paper the artificial neural network training algorithm is implemented in MATLAB language. This implementation is focused on the network parameters in order to get the optimal architecture of the network that means (the optimal neural network is the network that can reach the goals in minimum number of training iterations and minimum time of training). Many examples were tested and it was shown that using one hidden layer with number of neuron equal to the square of the number of inputs will lead to optimal neural network by mean of reducing the number of training stages (number of training iterations) and thus the processing time needed to train the network. Our goal in this paper is reaching the optimal solution by reaching minimum training time and minimum number of training iterations.
Uploads
Papers by Ziad Alqadi
The proposed method will be implemented using various messages and various covering images, the obtained results will be used to prove the enhancements provided by this method in the quality and speed of message steganography.
The introduced method will simplify the process of message cryptography by applying simple reordering operations and eliminating the need to use a complex og logical operations used in other methods of message cryptography.
The proposed method will be implemented and tested using various short, medium and long messages, the obtained results will be analyzed to prove the enhancements provided by the proposed method in: speed, quality and sensitivity of message cryptography.
The proposed MSE_LSB method will be tested and implemented using various short, medium and long messages, the obtained results will be used to prove the fact that the proposed method will meet the requirements of good stego system (quality, security, sensitivity and speed). The speed results of the proposed method will be compared with other methods speeds to show how the proposed method will increase the speed of message steganography by decreasing both the hiding and extracting times.
The proposed method will be implemented and tested using various messages, the results will be studied and analyzed to prove the achievements provided by the method in: quality, speed, security and sensitivity.
In this paper research a detailed analysis of CLM will be introduced. The behavior of CLM will be studied to show how to select the best values of the CLM parameters (growth rate, initial population and the length of the population). Various ranges of the population growth and the initial population will be tested. It will be shown how to use the generated populations to form various secret keys. The sensitivity of CLM will be studied, and it will be shown that any minor changes in the CLM parameters will lead to change the generated population. The population generation time will be tested using various in length generated population, and some recommendation will be provided when dealing with data with big size. It will be shown that using CLM will provide a good security level when using the CLM parameters as a private key.