Mustafa Dhiaa Al-Hassani
Mustansiriyah University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Underwater image copyright protection using robust watermarking technique Methaq Talib Gaata; Mustafa Dhiaa Al-Hassani
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp1148-1156

Abstract

It became possible to send and reformat underwater images for copyright theft due to the rapid advancement of computer networks and image forgery tools. Acquiring underwater images is dangerous and requires much efforts, expensive imaging equipment, and professional photographers. Therefore, there is an urgent need to develop copyright protection methods to ensure that property rights are not lost. This paper presents a robust watermarking technique that ensures proof of ownership for underwater images, preventing unauthorized individuals from claiming ownership. The suggested watermarking technique's main contribution depends on using the Hough transform in order to find appropriate regions to hide the watermark information within the underwater images. The Hough transform is useful for identifying areas of difficult texture that can be used as a host for watermark information with minimal distortion. Also, the Twofish algorithm has been used to encrypt the watermark information before being hidden in the underwater image. The performance of the suggested watermarking technique is tested by two metrics: quality and robustness. The results show that the suggested method works because of the quality of the images that were made after the watermark was added and because it could withstand the attacks on it.
Development of playfair cryptosystem based on generation a multi-dimensional key matrix Mustafa Dhiaa Al-Hassani; Methaq Talib Gaata
Bulletin of Electrical Engineering and Informatics Vol 12, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i3.5052

Abstract

Playfair is considered as one of the classical encryption symmetric methods, it has a limitation of using just 5×5 matrix, which means only 25 English letters could be represented. In this work, a 2D and 3D method is adopted as an expanded matrix that encompass the overall American standard code for information interchange (ASCII) codes in a permuted manner for all symbols of any language. Any sort of the multi-dimensional matrix will enhance the security by increasing the complexity on the attacker to try 256! patterns of keys probabilities instead of 25!. The key-matrix is generated from the chaotic maps for some control parameters as patterns of non-repeating random numbers from 0 to 255 equivalent to their ASCII code values. The security of the proposed method not rely only on the number of key probabilities, but exceed that to: matrix dimensionality, encryption/decryption algorithms, initial chaotic parameters, and key-matrix values permutation. The efficiency of the proposed cryptosystem has been investigated when tested on 784 samples according to security measurements in which the obtained number of pixels change rate (NPCR) (99.609) is very close to the ideal value, while the correlation plotting close to zero (0.00058) and entropy near from 8 (7.9998).