Ayad Al-Adhami
University of Technology

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Video mosaic watermarking using plasma key Nidaa Flaih Hassan; Akbas Ezaldeen Ali; Teaba Wala Aldeen; Ayad Al-Adhami
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp619-628

Abstract

Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of Gaussian noise, JPEG compression, and rotation process.
A secure communication protocol for civil drones Ayad Al-Adhami; Rajaa K. Hasoun; Ekhlas K. Gbashi; Soukaena Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1490-1501

Abstract

This paper introduces a secure communication protocol that provides secured communication pathways to manipulate drones through unsecured communication. The deployment of the proposed protocol works through providing two secured communication paths; drones to the drone’s controller path and controller to data centre path. The first secured communication path has achieved a high level of security and privacy by using a modification of SHA-1 method and an advanced encryption method. The modification of the SHA-1 is called 83SHA-1. These modifications can increase rounds in the first stage up to 83 rounds, inject each round with expansion and S-Boxes procedures that are used in DES to extend length from 160 to 240 bits then reduce it from 240 to 160 bits. After hash data from the drone then use the advanced encryption method which is called Geffe-Genetic (GG) Encryption algorithm where three types of keys will be used for deception attackers. The second accomplishment is to ensure providing secure communication between the drone’s controller and datacentre by using RNA-RADG-CBC (RRCBC) encryption algorithm where will generate an initialization vector (IV) for cipher block chaining (CBC) randomly, generate keys, and propose an encryption/decryption method. The security analysis shows a promising high security level of drones’s data.