Obaida M. Al-hazaimeh
Al-BALQA Applied University

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

A new speech encryption algorithm based on dual shuffling Hénon chaotic map Obaida M. Al-hazaimeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i3.pp2203-2210

Abstract

Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common cryptanalysis attacks such as linear and differential attacks are infeasible.
A new RSA public key encryption scheme with chaotic maps Nedal Tahat; Ashraf A. Tahat; Maysam Abu-Dalu; Ramzi B. Albadarneh; Alaa E. Abdallah; Obaida M. Al-Hazaimeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (782.575 KB) | DOI: 10.11591/ijece.v10i2.pp1430-1437

Abstract

Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends on both integer factorization and chaotic maps discrete logarithm (CMDL). Using this new system, the scammer has to go through two levels of reverse engineering, concurrently, so as to perform the recovery of original text from the cipher-text has been received. Thus, this new system is supposed to be more sophisticated and more secure than other systems. We prove that our new cryptosystem does not increase the overhead in performing the encryption process or the decryption process considering that it requires minimum operations in both. We show that this new cryptosystem is more efficient in terms of performance compared with other encryption systems, which makes it more suitable for nodes with limited computational ability.
Chaotic based multimedia encryption: a survey for network and internet security Obaida M. Al-Hazaimeh; Ashraf A. Abu-Ein; Malek M. Al-Nawashi; Nasr Y. Gharaibeh
Bulletin of Electrical Engineering and Informatics Vol 11, No 4: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i4.3520

Abstract

Nowadays the security of multimedia data storage and transfer is becoming a major concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be utilized for multimedia data encryption since multimedia data include an enormous quantity of redundant data, a very large size, and a high correlation of data elements. Chaos-based approaches have the necessary characteristics for dynamic multimedia data encryption. In the context of dynamical systems, chaos is extremely dependent on the initial conditions, non-convergence, non-periodicity, and exhibits a semblance of randomness. Randomness created from completely deterministic systems is a particularly appealing quality in the field of cryptography and information security. Since its inception in the early '90s, chaotic cryptography has seen a number of noteworthy changes. Throughout these years, several scientific breakthroughs have been made. This paper will give an overview of chaos-based cryptography and its most recent advances.
Chaotic elliptic map for speech encryption Obaida M. Al-hazaimeh; Ashraf A. Abu-Ein; Khalid M. Nahar; Isra S. Al-Qasrawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1103-1114

Abstract

Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has been developed for secure speech communication data. Jacobian elliptic map-based speech encryption has been developed as a novel method to improve the existing speech encryption methods' drawbacks, such as poor quality in decrypted signals, residual intelligibility, high computational complexity, and low-key space. Using the Jacobian elliptic map as a key management solution, a new cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram analysis, key space analysis, correlation analysis, key sensitivity analysis and randomness test analysis. Using the results, we can conclude that the proposed speech encryption scheme provides a better security system with robust decryption quality.
Analysis of the current state of deepfake techniques-creation and detection methods Ashraf A. Abu-Ein; Obaida M. Al-Hazaimeh; Alaa M. Dawood; Andraws I. Swidan
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1659-1667

Abstract

Deep learning has effectively solved complicated challenges ranging from large data analytics to human level control and computer vision. However, deep learning has been used to produce software that threatens privacy, democracy, and national security. Deepfake is one of these new applications backed by deep learning. Fake images and movies created by Deepfake algorithms might be difficult for people to tell apart from real ones. This necessitates the development of tools that can automatically detect and evaluate the quality of digital visual media. This paper provides an overview of the algorithms and datasets used to build deepfakes, as well as the approaches presented to detect deepfakes to date. By reviewing the background of deepfakes methods, this paper provides a complete overview of deepfake approaches and promotes the creation of new and more robust strategies to deal with the increasingly complex deepfakes.