Keywords : Encryption


Encrypt and Hide Data in True Color Image Classes

Maha A. Hasso; Shahad A. Hasso; Ban Ghanem Maayouf

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 3, Pages 75-89
DOI: 10.33899/csmj.2013.163537

In a world that has evolved in which the information and means of transmission within the network of the whole world not to be a convenient way to keep that information to have some privacy or confidentiality had to be hide from some people who may resort to playing with them or use them brings harm to himself and to others and make them exclusive to the needed, and that was the motivation for the selection of research topic, it is aimed primarily to find a new technique to protect data.
In this research the application of triple data encryption standard  (3DES)  to encrypt a given text using multiple keys then hide the encrypted text in a true color  image, after selecting their own identity by k-means algorithm for classification and a number of varieties.
Data has been hidden as bytes by putting it in the image (depending on the classification) and results showed high accuracy in the hiding did not appear to the human eye is no evidence on the existence of hidden data in the image in each color of the components of the (24 bit), any image that the unit used for the image store 3 bytes of the encrypted text so it is possible using the proposed algorithm to hide the size of any text, without the appearance of any effect on the resulting image.
The results showed that the size of the cover image after hiding the encrypted text is the same as it is before the process of hiding, and also found the application to increase or decrease the number of items does not represent a major factor in hiding, but whenever the size of the image is greater (Dimensions), the greater the proportion of hiding. Visual C # language have been used to implement the proposed method.
 

Use the Genetic Algorithm to Encode and Hide Gray Image Data

Raya Jassim Essa; Reham Jassim Essa; Inam Muhammad Sulaiman

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 1, Pages 169-182
DOI: 10.33899/csmj.2013.163450

With the development of means of communication, computer science and information exchange via electronic information networks an  urgent need emerged to find ways to save exchanged information. Encryption had a prominent role in this area. However, with the development of intrusion hackers become able to  access to information and change it. This showed the need to adopt more sophisticated technology and more confidentiality in order to preserve the information. So, it become famous to  use the system of coverage in which the sent the information being  invisible to anyone, through hiding it inside the sent media, such as audio, image, text, and video. 
This paper aims to apply the idea to hide image message, using the least significant bit  algorithm inside an image and encrypt it in a new way for encryption using a genetic algorithm. For the purpose of increasing security of the access of the letter it is being encrypted to hide the message before using the genetic algorithm to generate random numbers employed in the process of concealment, for the highest extent of randomness. This in turn increases the strength of encryption and concealment. The study has been able to achieve this by adopting the recommended approach in such cases
 

Development AES Algorithm to Encryption Images and Sounds Files

Mohammed C.Y. Al-Zubaidy

AL-Rafidain Journal of Computer Sciences and Mathematics, 2012, Volume 9, Issue 1, Pages 113-127
DOI: 10.33899/csmj.2012.163675

In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to reach the maximum size of 512 bit instead 128 bit/cycle, by using the Thread API techniques, which is a break off CPU working for increasing times taken the inline encrypt or decrypt operations. The data entranced from the file by size 512 bits per cycle, is converted to one dimension matrix by block size which is 2048 bit. The method considered 4-lines using 4 AES, which in every line, one AES is working in a distinct system.
Transmission and reception of encoded files could be performed by using Email programs provided that the sent file does not include the encoding key for the purpose of protecting encoded files against unauthorized access.
In addition to the use of the histogram in this research by comparing the block size of images or sounds files through the encrypting or decrypting system by scanning bit to bit operations. The implement algorithm with a sample of histogram was used to ensure that the data is not changed throughout this study.
 

Hyper Secure Algorithm for Text

Melad jader saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 51-65
DOI: 10.33899/csmj.2011.163651

Classical encryption methods depend on two basic encryption method, namely MONO ALPHABET and POLY ALPHABET.
            In this research, we developed a hybrid encryption algorithm to overcome the weaknesses in both methods and  employed  the basic methods  of themselves. The output  ciphertext is characterized  with the high security  when it does not give the expected results using the basics to break the code, namely, (adoptig the frequencies of the language used i.e. Frequency Analysis, besides Coincidence and Kasiski test).
            The problem of  distributing the secret key has been also overcome by adopting a new technique to  hide the  key inside the encrypted text in a nearly proposed way. Experimental result has been demonstrated that it is difficult to determine  the used encryption method ,in this algorithm we used MATLAB.
 

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform

Shaimaa Sh. Mohammad

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 87-97
DOI: 10.33899/csmj.2011.163645

In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing. To increase the effective of this algorithm chaotic logistic map are used to select the embedding position in host chaotically which increase the security and make it hard to be detected, experimental result which be measured by using (Mean Square error, Peak signal to noise ratio , Signal to Noise Ratio, CORLLATION) has value (0.3195, 53.0867, 45.9152, 0.9998) respectively reflect the effective of this algorithm, the watermarked image has no noticeable change, some image processing operation such as(filter ,noise and compression) are used to test the robustness which measured by calculate similarity between extracted watermark after attack and the original one, Programming based on Matlab9.
 

Chaotic Encryption Based on Biometric Key

Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 183-198
DOI: 10.33899/csmj.2010.163937

In this paper a new algorithm is suggested to encrypt data, as it was to benefit from human iris as one of Biometric properties in human body which distinguish the individual from the other to produce the encryption through extracting important features using Wavelet Transformation and then passing through a series of  operations moderation as the first phase, at the second phase a chaotic function properties is used by leading it in encryption operation as a basic factor.
Through the overlap between the results of above  phases a new encryption  algorithm is produced which show  strength, and could not discover the encryption key until  getting  the biometric property and  finding complete information about the chaotic used function  in addition to the working algorithm .
 

Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

Amera Istiqlal Badran; Abdulsattar M. Khidhir; laheeb Mohammed Ibrahim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 199-208
DOI: 10.33899/csmj.2010.163938

In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis function Network to produce the weights.
Cover is delivered once to the recipient who can use it for unlimited number of messages. The weights are delivered to the recipient for each hidden message as a key. The recipient uses the cover with the weights to unhide the message. So that this method include two levels of security. The first one is hiding the message in the cover to produce stego-cover image. The second one is ciphering the embedded image using RBF Neural Network. This Network is considered as a target and the input to the Neural Network is the cover image. Then the weights, which represent the encrypted information are reconstructed. The recipient can use RBF Network to unhide the message by having the stego-cover image then the message.
Matlab R2008a was used in this paper.
 

Stream Cipher Using Genetic Algorithm

Melad jader saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009, Volume 6, Issue 3, Pages 111-126
DOI: 10.33899/csmj.2009.163840

The research tackles newly suggested method  in generating the random key used in stream cipher, by generating the key randomly using rand function and then applying randomness conditions if the produced key satisfy the conditions then its accepted key other wise,Genetic Algorithm (GA) are used to produce the key stream.
The proposed method used new structure style to hide the encrypted key withen the text. In addition simple hash function is used to check the integrity of the empeded encrypted key.