Salim Muhsin Wadi
Al-Furat Al-Awsat Technical University (ATU)

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A robust watermark algorithm for copyright protection by using 5-level DWT and two logos Alaa Rishek Hoshi; Nasharuddin Zainal; Mahamod Ismail; Abd Al-Razak T. Rahem; Salim Muhsin Wadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp842-856

Abstract

Recent growth and development of internet and multimedia technologies have made it significant to upload data; however, in this situation, the protection of intellectual property rights has become a critical issue. Digital media, including videos, audios, and images are readily distributed, reproduced, and manipulated over these networks that will be lost copyright. Also, the development of various data manipulation tools like PDF converter and Photoshop Editor has resulted in digital data copyright issues. So, a digital watermarking technique has emerged as an efficient technique of protecting intellectual property rights by providing digital data copyright authentication and protection. In this technique, a watermarked document was integrated into electronic data to prevent unauthorized access. In this paper, A robust watermark algorithm based on a 5-level DWT and Two Log was proposed to enhance the copyright protection of images in unsecured media. Our lab results validate that our algorithm scheme is robust and forceful against several sets of attacks, and high quality watermarked image was achieved, where the algorithm was assessed by computation of many evaluation metrics such as PSNR, SNR, MAE, and RMSE.
Binary decomposition-based image cipher algorithm with flexible method for key construction Salim Muhsin Wadi; Huda Hussein Abed; Nada Taher Malik; Ahmed Taha Abdullsadah
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp201-208

Abstract

Image security is still one of the important fields in multimedia processing because it’s used in our daily lives. Watermarking, steganography, and ciphering are three directions to keep an image secret. Encryption defined as the process of changing information (which called plaintext) into an unreadable secret format (which called cipher-text). A new ciphering algorithm based on binary decomposition and binary codes conversion is proposed in this paper. The key is constructed in a flexible way based on the size of a secret image using some logical operations to increase the security levels. Three test images in different sizes were used to evaluate the performance of the proposed algorithm. The results of the visual scene and statistical factors proved that the suggested method was ciphering the image with high security. The proposed work was validated to confirm its effectiveness. As conclusions, the uses of decomposition and simple binary operations have given high-level image security. Also, key construction is an important step to face several types of attackers.