Keywords : security


Application of Chaotic Neural Network for Authentication using the Database

Ammar Thaher Yaseen Abd Alazeez

AL-Rafidain Journal of Computer Sciences and Mathematics, 2014, Volume 11, Issue 1, Pages 81-95
DOI: 10.33899/csmj.2014.163740

  In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding  by entering values to the artificial neural network for training as well as hide in the picture, beside use the database for storage and retrieval information and increase the secret system. Through the overlap between the results of stages encryption and hide and artificial neural network algorithm was obtained exciting new strength from where you can not detect secret text only after obtaining random values of the chaotic algorithm and information about neural network algorithm as well as algorithm of work.
 

Design and Implementation of Distributed Real-time Security System via Mobile Technology

Dhuha Basheer Abdullah; Wael W. Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 2, Pages 79-99
DOI: 10.33899/csmj.2013.163476

In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based on the transfer of signal in real time when there is a breach and image of an unauthorized person to enter the building to the mobile phone of the person who is responsible for the security of the building.
            The real time system consists of three main parts, the first one is the computer with an electronic circuit connected via the serial port. The designed electronic circuit contains the Microcontroller for reading sensors connected to ports of the building (G1, G2, and G3) and processing the signals. Also, there is a monitoring camera to capture an image when registering a case of breach. The program in the computer receives signals from the three ports and uses a fixed real time algorithm for scheduling signals and gives them priorities according to the importance of ports, then sends signals to the second part of the system. The second part of the system consists of a server on the Internet which receives signal and image of the breach, stores it in a database system and then transferring it in real time to the third part. The third part consists of several mobile phones to achieve the principle of distribution for this system, each mobile phone will be responsible for a single port in the building, while there is one mobile phone responsible for all ports which belongs to the person who is responsible for the building security. Each mobile phone contains three programs, the first program would receive a signal of the breach and give the alarm, the second program displays picture, and the third program sends a control signal.
 

Use the Genetic Algorithm to Encode and Hide Gray Image Data

Raya Jassim Essa; Reham Jassim Essa; Inam Muhammad Sulaiman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 1, Pages 169-182
DOI: 10.33899/csmj.2013.163450

With the development of means of communication, computer science and information exchange via electronic information networks an  urgent need emerged to find ways to save exchanged information. Encryption had a prominent role in this area. However, with the development of intrusion hackers become able to  access to information and change it. This showed the need to adopt more sophisticated technology and more confidentiality in order to preserve the information. So, it become famous to  use the system of coverage in which the sent the information being  invisible to anyone, through hiding it inside the sent media, such as audio, image, text, and video. 
This paper aims to apply the idea to hide image message, using the least significant bit  algorithm inside an image and encrypt it in a new way for encryption using a genetic algorithm. For the purpose of increasing security of the access of the letter it is being encrypted to hide the message before using the genetic algorithm to generate random numbers employed in the process of concealment, for the highest extent of randomness. This in turn increases the strength of encryption and concealment. The study has been able to achieve this by adopting the recommended approach in such cases