Aisha Al-Noori

ORCID: 0000-0003-4276-7704
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • Quantum Computing Algorithms and Architecture
  • Video Coding and Compression Technologies
  • User Authentication and Security Systems
  • Metaheuristic Optimization Algorithms Research
  • Advanced Multi-Objective Optimization Algorithms
  • Evolutionary Algorithms and Applications
  • Digital Media Forensic Detection

Kuwait Petroleum Corporation (Kuwait)
2018-2023

Kuwait University
2015-2023

Steganography has become one of the most significant techniques to conceal secret data in media files. This paper proposes a novel automated methodology achieving two levels security for videos, which comprise encryption and steganography techniques. The enhances level without affecting accuracy capacity videos. In first level, is encrypted based on Advanced Encryption Standard (AES) algorithm using Java language, renders unreadable. second concealed video frames (images) FPGA hardware...

10.1142/s021812661950083x article EN Journal of Circuits Systems and Computers 2018-06-21

Arithmetic optimization algorithm (AOA) is a recent population-based metaheuristic widely used for solving problems. However, the emerging large-scale problems pose great challenge AOA due to its prohibitive computational cost traverse huge solution space effectively. This article proposes parallel Spark-AOA using Scala on Apache Spark computing platform. leverages intrinsic nature of and native iterative in-memory computation support through resilient distributed datasets (RDD) accelerate...

10.4018/ijamc.318642 article EN International Journal of Applied Metaheuristic Computing 2023-02-24

Secrecy in communication is critical for people that have sensitive information. Steganography a field secures information by hiding it inside media files (such as images). What makes the concept of steganography powerful secret message hidden cleverly within file and thus carried around invisibly. Our paper proposed an automated method to secure using two levels security. In first level, data encrypted our encryption developed Java named Character Bit Shuffler (CBS). Then second image Least...

10.1109/icmsao.2017.7934929 article EN 2017-04-01

The Advanced Encryption Standard (AES) is a symmetric key block cipher cryptosystem adopted by the NIST as world standard for data encryption/decryption. Multi-valued logic (MVL), opposed to two-valued (TVL), propositional calculus in which there are more than two truth values. Multiple-valued offers opportunities overcoming number of difficulties facing TVL such chip area, power consumption, and delay. A researchers have conducted intensive research work attempts improve enhance performance...

10.1109/ecs.2015.7124808 article EN 2015 2nd International Conference on Electronics and Communication Systems (ICECS) 2015-02-01

The Advanced Encryption Standard (AES) is the current world standard symmetric key block cipher cryptosystem for data encryption/decryption. Multi-valued logic (MVL) a propositional calculus that goes beyond binary in terms of number truth values. There has been intensive research work conducted attempting to enhance performance cryptographic systems speed and area. We have previously presented gate-level design Modulo-4 Galois field (GF) arithmetic operations using both MVL. In this paper,...

10.1109/asiajcis.2016.15 article EN 2016-08-01

10.1109/ecs.2015.7124807 article EN 2015 2nd International Conference on Electronics and Communication Systems (ICECS) 2015-02-01
Coming Soon ...