Ashraf A. Abu-Ein
Al-Balqa Applied University

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Chaotic based multimedia encryption: a survey for network and internet security Obaida M. Al-Hazaimeh; Ashraf A. Abu-Ein; Malek M. Al-Nawashi; Nasr Y. Gharaibeh
Bulletin of Electrical Engineering and Informatics Vol 11, No 4: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i4.3520

Abstract

Nowadays the security of multimedia data storage and transfer is becoming a major concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be utilized for multimedia data encryption since multimedia data include an enormous quantity of redundant data, a very large size, and a high correlation of data elements. Chaos-based approaches have the necessary characteristics for dynamic multimedia data encryption. In the context of dynamical systems, chaos is extremely dependent on the initial conditions, non-convergence, non-periodicity, and exhibits a semblance of randomness. Randomness created from completely deterministic systems is a particularly appealing quality in the field of cryptography and information security. Since its inception in the early '90s, chaotic cryptography has seen a number of noteworthy changes. Throughout these years, several scientific breakthroughs have been made. This paper will give an overview of chaos-based cryptography and its most recent advances.
Chaotic elliptic map for speech encryption Obaida M. Al-hazaimeh; Ashraf A. Abu-Ein; Khalid M. Nahar; Isra S. Al-Qasrawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1103-1114

Abstract

Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has been developed for secure speech communication data. Jacobian elliptic map-based speech encryption has been developed as a novel method to improve the existing speech encryption methods' drawbacks, such as poor quality in decrypted signals, residual intelligibility, high computational complexity, and low-key space. Using the Jacobian elliptic map as a key management solution, a new cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram analysis, key space analysis, correlation analysis, key sensitivity analysis and randomness test analysis. Using the results, we can conclude that the proposed speech encryption scheme provides a better security system with robust decryption quality.
Analysis of the current state of deepfake techniques-creation and detection methods Ashraf A. Abu-Ein; Obaida M. Al-Hazaimeh; Alaa M. Dawood; Andraws I. Swidan
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1659-1667

Abstract

Deep learning has effectively solved complicated challenges ranging from large data analytics to human level control and computer vision. However, deep learning has been used to produce software that threatens privacy, democracy, and national security. Deepfake is one of these new applications backed by deep learning. Fake images and movies created by Deepfake algorithms might be difficult for people to tell apart from real ones. This necessitates the development of tools that can automatically detect and evaluate the quality of digital visual media. This paper provides an overview of the algorithms and datasets used to build deepfakes, as well as the approaches presented to detect deepfakes to date. By reviewing the background of deepfakes methods, this paper provides a complete overview of deepfake approaches and promotes the creation of new and more robust strategies to deal with the increasingly complex deepfakes.