Papers by Omar G . Abood
Enhancing Performance of Advanced Encryption Standard for Data Security
International Journal of Engineering, Nov 28, 2018

International Journal of Engineering, Jan 28, 2019
The emergence of the research topic of DNA in the field of Information Storage, Security and Cryp... more The emergence of the research topic of DNA in the field of Information Storage, Security and Cryptography has promised new heights to the field. DNA computing is a novel method of simulating the bio-molecular structure of DNA and computing. The promise it came with was a brand-new mean of data structure and calculation which would provide a brand-new generation for storage and more importantly, security and cryptography due to the wide array of parallelism in DNA. The field of cryptography would thrive if the DNA is properly used as it can realize several security technologies such as Encryption, Steganography, Signature and Authentication through the DNA molecular as information medium. This work presents the broad idea of using the existing DNA cryptosystems which utilize the use of the four DNA symbols (A, T, C and G) that represent the four binary two-tuples (00, 01, 10, and 11). However, the obstacles facing the DNA cryptography systems stand in the influence of Turing in the corresponding theoretical computing model. Where it stands in the theoretical stage, it seems to have the ability to solve major problems regarding the security of systems through cryptography.
Lossy Compression Using Stationary Wavelet Transform and Vector Quantization الضغط مع الفقد بأستخدام تحويل المويجات الثابتة والتكميم الأتجاهي
International Journal of Soft Computing, 2020
Internet exploration is the use of data mining systems to discover patterns of information and re... more Internet exploration is the use of data mining systems to discover patterns of information and relationships from internet data via data mining techniques. The aim of this study is to locate an efficient algorithm for web news mining with analysis of web news data using data clustering and classification procedures based on deep learning, as well as to evaluate the best way to use site news information algorithms compared to other technologies, and to assess the reliability of the internet news databases that are used as tools and techniques for data mining. In this study, we used an effective algorithm (H ash) that is used to collect and classify data for the best classification of Internet news with results close to 95. 66% accuracy.

Research Journal of Applied Sciences, Engineering and Technology, 2017
The aim of the study is to reduce the size required for storage along with decreasing the bitrate... more The aim of the study is to reduce the size required for storage along with decreasing the bitrate and the bandwidth for the process of sending and receiving the image. It also aims to decrease the time required for the process as much as possible. This study proposes a novel system for efficient lossy volumetric medical image compression using Stationary Wavelet Transform and Linde-Buzo-Gray for Vector Quantization. The system makes use of a combination of Linde-Buzo-Gray vector quantization technique for lossy compression along with Arithmetic coding and Huffman coding for lossless compression. The system proposed uses Stationary Wavelet Transform and then compares the results obtained to Discrete Wavelet Transform, Lifting Wavelet Transform and Discrete Cosine Transform at three decomposition levels. The system also compares the results obtained using transforms with only Arithmetic Coding and Huffman Coding for Lossless Compression.The results show that the system proposed outperforms the others.

International Journal of Scientific and Research Publications (IJSRP), 2018
With the major advancements in the field of technology and electronics, one persistent obstacle h... more With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data transfer through the web, the data should be encrypted. Encryption is the process of transforming plain text into ciphered-text, which cannot be understood or altered easily by undesirable people. It can also be defined as the science that uses mathematics in data encryption and decryption operations. In this paper, we discuss several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of data security effectiveness, key size, complexity and time, etc. This research focused on different types of cryptography algorithms that are existing, like AES, DES, TDES, DSA, RSA, ECC, EEE and CR4…etc.

Investigation of cryptography algorithms used for security and privacy protection in smart grid
2017 Nineteenth International Middle East Power Systems Conference (MEPCON), 2017
Computer information has taken over many aspects of everyday life. One of those aspects has been ... more Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.

Enhancing AES Algorithm with DNA Computing
2018 28th International Conference on Computer Theory and Applications (ICCTA)
DNA cryptography is a modern promising path in cryptography research that surfaced with the impro... more DNA cryptography is a modern promising path in cryptography research that surfaced with the improvement in Deoxyribonucleic Acid (DNA) computing field. Traditional cryptographic systems have an extended legacy and are designed on a solid mathematical and theoretical basis. Thus, an important notion must be developed that the DNA cryptography is never to negate the tradition, but to make a bridge between existing and new technology. The strength of DNA computing will fortify the existing security systems by checking up a new probability of the hybrid cryptographic system. This paper aims to present a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm has been implemented with all its features (data, algorithms operations and used functions) on DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. The presented algorithm keeps a security quality and strength of the standard algorithm. The assessment of the presented method is carried out using MATLAB 2016b. The experimental results show a significant improvement in terms of breaking time for different text file sizes.
International Journal of Soft Computing
Internet exploration is the use of data mining systems to discover patterns of information and re... more Internet exploration is the use of data mining systems to discover patterns of information and relationships from internet data via data mining techniques. The aim of this study is to locate an efficient algorithm for web news mining with analysis of web news data using data clustering and classification procedures based on deep learning, as well as to evaluate the best way to use site news information algorithms compared to other technologies, and to assess the reliability of the internet news databases that are used as tools and techniques for data mining. In this study, we used an effective algorithm (H ash) that is used to collect and classify data for the best classification of Internet news with results close to 95. 66% accuracy.

This paper presents an algorithm based on AES through modifications of the system. The algorithm ... more This paper presents an algorithm based on AES through modifications of the system. The algorithm developed herein is based on incorporating DNA computing in AES algorithm instead of the mix-column stage. The modified algorithm enhances the process to be more secure under the communicated signals used in the smart grid especially in the self-healing process. The breaking time is increased via using two keys whilst keeping the round times. Furthermore, the encryption and decryption times are decreased which is a critical in many smart grid applications. The work carried out a comparison within the study between the modified and the conventional AES algorithms under the different methods of control employed in the fault management. The total time needed to accomplish the fault management process including the encryption and decryption times is computed and evaluated. The assessment of the presented method is done through MATLAB. The sample results are evaluated and discussed.

Journal of Sports and Physical Education (IOSR-JSPE) , 2018
Sport organization is a thriving industry. It is vivid, dynamic, and changeable. Besides, it is a... more Sport organization is a thriving industry. It is vivid, dynamic, and changeable. Besides, it is a lucrative sector, where profits could be increased amazingly and satisfy the owner's organization, particularly, if it is digitized with current state-of-art equipment. However, there was no book before that tackles this interest in details, neither in brief. That is to say, the researcher or the interested individual will not be able to find an access anywhere to what he expects of a clear, coherent and feasible data in this field. According to this urgent need, this book has seen the light, where we consider deeply the necessity of high-tech devices in keeping a sport organization in the forefront and offering inevitable information for those concerned. "Smart Sport Management" will be a cement for many following seminars and books in figure 1 show the book cover. It is a pioneer guide to acknowledge the importance of intermingling between a sport organization on one hand and information technology on the other.

Compression is the art of representing the information in a compact form rather than in its origi... more Compression is the art of representing the information in a compact form rather than in its original or uncompressed form. In other words, using the data compression, the size of a particular file can be reduced. This is very useful when processing, storing or transferring a huge file, which needs lots of resources. If the algorithms used to encrypt work properly, there should be a significant difference between the original file and the compressed file. When the data compression is used in a data transmission application, speed is the primary goal. The speed of the transmission depends on the number of bits sent, the time required for the encoder to generate the coded message, and the time required for the decoder to recover the original ensemble. In a data storage application, the degree of compression is the primary concern. Compression can be classified as either lossy or lossless.
Image compression is a key technology in the transmission and storage of digital images because of vast data associated with them. This research suggests an effective approach for image compression using Stationary Wavelet Transform (SWT) and Vector Quantization which is a Linde Buzo Gray (LBG) vector quantization in order to compressed input images in four phases; namely preprocessing, image transformation, zigzag scan, and lossy/lossless compression. Preprocessing phase takes images as input, so that the proposed approach resize the image in accordance with the measured rate of different sizes to (8 × 8) And then converted from (RGB) to (gray scale). Image transformation phase received the resizable gray scale images and produced transformed images using SWT. Zigzag scan phase takes as an input the transformed images in 2D matrix and produced images in 1D matrix. Finally, in lossy/lossless compression phase takes 1D matrix and apply LBG vector quantization as lossy compression techniques and other lossless compression techniques such as Huffman coding and arithmetic coding. The result of our approach gives the highest possible compression ratio and less time possible than other compression approaches. Our approach is useful in the internet image compression.

International Journal & Magazine of Engineering, Technology, Management and Research, 2016
In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Trans... more In this paper, we introduce an approach to compressed the image by using Stationary Wavelet Transforms (SWT), Back Propagation Neural Network (BPNN) and Lempel-Ziv-Welch (LZW). Our approach consists of four phases are: (1) pre-processing, (2) Image transforms, (3) Vector Scan and (4) Hybrid compression. In preprocessing phase, resized the image into matrix 8x8 and converting to grey scale image. Image transformation phase, we use SWT to transform the image which remove the redundancy in image. In vector scan we convert from 2-dimensional matrix into 1-dimensional matrix by using zigzag scan. In hybrid compression we use Vector quantization by BPNN and LZW lossless techniques. Our Datasets collects from standard images in image compression. Our results give high compression ratio than other techniques used in image compressions with high elapsed time than other techniques, so we enhance the performance over elapsed time.

IEEE, Feb 27, 2018
— Computer information has taken over many aspects of everyday life. One of those aspects has bee... more — Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages concerning the security of those smart grids. Concerns regarding the compromise of the system have been issues of debate in the recent years. With that said, there are several encryption algorithms that are commonly used to secure and cipher the sensitive data from being stolen or altered. This work presents a survey and a comparison between the most well-known algorithms to help ensure security for those systems. The algorithms that were selected for this work are AES, DES, TDES, E-DES, RSA and BLOWFISH. The comparison is set between to find the effectiveness, key size, complexity and time required between those algorithms. The performance evaluation of these algorithms is evaluated using MATLAB.

Maxwell Scientific Publication, Sep 15, 2017
The aim of the study is to reduce the size required for storage along with decreasing the bitrate... more The aim of the study is to reduce the size required for storage along with decreasing the bitrate and the bandwidth for the process of sending and receiving the image. It also aims to decrease the time required for the process as much as possible. This study proposes a novel system for efficient lossy volumetric medical image compression using Stationary Wavelet Transform and Linde-Buzo-Gray for Vector Quantization. The system makes use of a combination of Linde-Buzo-Gray vector quantization technique for lossy compression along with Arithmetic coding and Huffman coding for lossless compression. The system proposed uses Stationary Wavelet Transform and then compares the results obtained to Discrete Wavelet Transform, Lifting Wavelet Transform and Discrete Cosine Transform at three decomposition levels. The system also compares the results obtained using transforms with only Arithmetic Coding and Huffman Coding for Lossless Compression.The results show that the system proposed outperforms the others.

With the major advancements in the field of technology and electronics, one persistent obstacle h... more With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data transfer through the web, the data should be encrypted. Encryption is the process of transforming plain text into ciphered-text, which cannot be understood or altered easily by undesirable people. It can also be defined as the science that uses mathematics in data encryption and decryption operations. In this paper, we discuss several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of data security effectiveness, key size, complexity and time, etc. This research focused on different types of cryptography algorithms that are existing, like AES, DES, TDES, DSA, RSA, ECC, EEE and CR4…etc.
Thesis Chapters by Omar G . Abood

Omar G. Abood, https://scholar.google.com.eg/citations?user=hwC8sKkAAAAJ&hl=ar&gmla=AJsN-F5FkZ60iRkl5RoH8gmQaTNKcKJKOdPPej93-E9wNHo3ISkts0_s3gjYw2yinBunb005io5R3sO-lWdTvQAkTLxi1RiT2Jglw6v3sS-K7jvUnWP966KrDQqczoXr689zwOVLKzmmZE1dJC4s_PWMfnDfka6XjDHq2wbgpAFDTcCLa-lggVI&sciund=18339398078938948894, 2019
Traditional cryptographic systems are built on strong mathematical and theoretical basis. Therefo... more Traditional cryptographic systems are built on strong mathematical and theoretical basis. Therefore, an important perception is needed to be developed that the DNA cryptography is not only to negate the tradition, but also to develop more interaction between existing and new technology. This thesis introduces and applies a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm is implemented with all its features (data, algorithms operations and used functions) using DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. To prevent plain-text attack, we generated three secret keys. (1) A main key presents the main key for AES algorithm. (2) A key presents the DNA base where the number of probabilities of the key, and we call DNA Rule 1. (3) A key presents the number of possibilities of binding between the helical structures of DNA increasing the key length. And is conducted in order to achieve a higher security level, and we call DNA Rule 2. The proposed algorithm is implemented and evaluated using MATLAB 2016b. The results proved better security against brute-force-attack and needed longer time to break when compared to other techniques. The security tests, performance analysis and evaluation of other techniques indicate that the proposed algorithm has higher security and more complexity. The proposed algorithm is secure and efficient to be used for image encryption-based applications. The standard images have been used to test and evaluate the proposed algorithm.
Uploads
Papers by Omar G . Abood
Image compression is a key technology in the transmission and storage of digital images because of vast data associated with them. This research suggests an effective approach for image compression using Stationary Wavelet Transform (SWT) and Vector Quantization which is a Linde Buzo Gray (LBG) vector quantization in order to compressed input images in four phases; namely preprocessing, image transformation, zigzag scan, and lossy/lossless compression. Preprocessing phase takes images as input, so that the proposed approach resize the image in accordance with the measured rate of different sizes to (8 × 8) And then converted from (RGB) to (gray scale). Image transformation phase received the resizable gray scale images and produced transformed images using SWT. Zigzag scan phase takes as an input the transformed images in 2D matrix and produced images in 1D matrix. Finally, in lossy/lossless compression phase takes 1D matrix and apply LBG vector quantization as lossy compression techniques and other lossless compression techniques such as Huffman coding and arithmetic coding. The result of our approach gives the highest possible compression ratio and less time possible than other compression approaches. Our approach is useful in the internet image compression.
Thesis Chapters by Omar G . Abood