Rana Saad Mohammed

ORCID: 0000-0003-4606-9954
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cryptographic Implementations and Security
  • Cellular Automata and Applications
  • Chaos control and synchronization
  • Digital Media Forensic Detection
  • Coding theory and cryptography
  • IoT and Edge/Fog Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Image and Video Retrieval Techniques
  • Algorithms and Data Compression
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Mathematical Dynamics and Fractals
  • Advanced Malware Detection Techniques
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Fractal and DNA sequence analysis
  • Blockchain Technology Applications and Security
  • Optical Systems and Laser Technology
  • Face and Expression Recognition
  • Blind Source Separation Techniques
  • Advanced Photonic Communication Systems

Mustansiriyah University
2015-2023

University of Babylon
2013-2015

University of Technology - Iraq
2009

Laboratoire d'Informatique de Paris-Nord
2009

It is well known that the wireless communications have great challenges in ensuring high security, due to facilities attacking communication channels. Hence there continues trends towards finding a suitable approach ensure security for communication. One of such approaches was with application chaos theory cryptosystems. This paper provides presentation proposed random Unified chaotic map as PRBG and its digital voice encryption. The encryption system testing subjective objective tests check...

10.1016/j.procs.2015.09.089 article EN Procedia Computer Science 2015-01-01

Cryptography techniques must develop with the developing of wireless communication technologies. One recent research is chaos based cryptography. Since there data redundant in signal, and not all maps are random, also attacker can take a periodic shape signal found system parameters. This paper proposed modifies two (Lorenz, Chen) using it as pseudorandom number generator (PRNG). By test for noisy chaotic dynamics results showed that more random compared original maps. The methods speech...

10.1109/aic-mitcsa.2016.7759928 article EN 2016-05-01

The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries information research community. This paper reviews most encryption techniques adopt chaos based cryptography, illustrates used voice communication as well. review this summarized traditional modern voice/speech demonstrated feasibility adopting cryptography for communications.

10.1109/iceccpce.2013.6998760 article EN 2013-12-01

The term Steganography refers to the science that deals with hiding secret messages (text or anything else) inside an original cover file of text, audio, video image. need for modern methods is keep information and protected it increasing danger outside hackers. seems be a good option increase security by them. This paper review past year's used in audio steganography. Audio steganography method hide message (sound file, varied ways. It proposal future actions. These different types digital...

10.1109/cas47993.2019.9075778 article EN 2019-12-01

Information Security has still the aim of many agencies and organisations. They have great attention to cryptosystems ensure security their information. So, scientists researchers had proposed improve performance via new methods techniques. Most recent studies depended on chaotic map with cipher systems which gained most its robustness. The continued mentioned several strength these based ciphers randomness keystream generation. Some successful techniques while others not or advised further...

10.1109/cas47993.2019.9075490 article EN 2019-12-01

Internet of things becomes important and its applications have widely used in the last years. These need a protection system against different attacks. This paper study recent IoT Security researches classifies them into following tends Cryptography, Authentication, Blockchain, data privacy preserving. And at this gives conclusions future work.

10.1109/iceccpce46549.2019.203774 article EN 2019-02-01

Privacy Preserving Association Rule Mining (PPAM) becomes an important issue in recent years. Since data mining alone is not enough to share between companies without privacy preserving. In this paper, a new technique has been proposed maintain the confidentiality of by fabricating association rule using stochastic standard map returning sensitive again. The system simulation Matlab and tested that shows successful difference original fabricated. And also achieved high speed fewer memory...

10.1109/aic-mitcsa.2016.7759930 article EN 2016-05-01

In recent years, the Internet of Things has gained prominence as a potential communication paradigm with wide range applications, including smart cities, homes, and intelligent transportation systems. The information gathered by variety IoT devices may be safely stored on (cloud) servers. between in networks rendered people unable to communicate one another due security authentication challenges such destruction or abuse devices. Things, privacy are important considerations. This paper...

10.1109/csase51777.2022.9759798 article EN 2022-03-15

The efficiency of a stream cipher is an important property that measures its robustness against the attacks and analysis. based on complexity generated keystream used to secure text images via digital transition through open networks such as emails use are in computers phones. randomness had great attention many studies improve ciphers. A new generation ciphers chaotic map presented. This paper proposed method generate Salsa20 algorithm with set functions chosen depending our previous...

10.1109/iiceta50496.2020.9318902 article EN 2020-09-06

The paradigm of the Internet Things (IoT) came to allow intercommunication between different objects via Internet. We expected that IoT could be applied soon for an easy and comfortable life in our daily life. security has a challenge needs improvement. challenges like damage or abuse devices include interaction networks is made people unable communicate with each other.In this paper, we introduced facing Things. discussed significant types existing cyber-attacks on domain, cloud domain...

10.1109/bicits51482.2021.9509899 article EN 2021-04-28

The design of a cipher system is essential and required with the development technology era.The internet things concept modern requiring lightweight, secure algorithms to investigate requirement light device.Furthermore, IoT devices have limited resources (IoT should minimize battery life, memory size, response time).A stream faster than block has an easy feature hardware software implementation.This paper designs lightweight authentication encryption algorithm based on chaotic maps sponge...

10.22266/ijies2023.0228.46 article EN International journal of intelligent engineering and systems 2022-12-30

In the context of Internet Things (IoT), lightweight steganography provides a revolutionary combination technology and security, where data concealment meets efficiency requirements IoT devices. Lightweight steganography, as opposed to conventional steganographic methods, focuses on concealing information inside digital content while using least amount computer resources energy. Secure transfer is essential in world because linked devices may communicate with one another without...

10.55145/ajest.2024.03.01.008 article EN cc-by Al-Salam Journal for Engineering and Technology 2023-11-18

The cloud computing providing to users and companies many services facilities such as less cost, availability risk management. of are delivered in pay per usage way on-demand it can store huge amount data. But the security concern is main reason that makes afraid using their data on servers. In this paper, we try review describe encryption methods used protect which stored make a comparison among these methods.

10.31695/ijerat.2019.3569 article EN International Journal of Engineering Research and Advanced Technology 2019-01-01

Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, quality resulting image, and time consumed. On other hand, dealing with color image under spatial domain in this filed is considered as another challenge added to proposed method that make it sensitivity difficulty. The aims encode a by main components red (R), green (G), blue (B) strengthen dependence each component modifying two dimensional...

10.11591/ijece.v11i4.pp3070-3083 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2021-04-29

This paper will introduce two proposal algorithms (Snowfish 1) and the 2) to improve Sosemanuk stream cipher algorithm by benefiting from efficient properties of Twofish block also use its key schedule, keydependent Sbox increase security, randomness try avoid guess determine attack Sosemanuk. These proposals rather than Serpent which was used in they static Sbox. They are similar same length (128 256 bit), IV LFSR length, FSM functions output transformation. In this make a comparison...

10.30684/etj.27.10.7 article EN cc-by Engineering and Technology Journal 2009-07-01

In recent years, encryption technology has been developed quickly and many image methods have put forward. This paper presents a technique of based on clustering as preprocessing. Permutation substitution processes are done by using series secret keys that generated proposed stochastic standard map. Image decryption is the reverse operations adding process rather than to recover an image. Experimental results verify prove secure fast.

10.1109/aic-mitcsa.2016.7759931 article EN 2016-05-01

Iris recognition is one of biometric techniques that provide fast and accurate for human identification.This paper studies four main types iris (Jewel, flower, stream, shaker).And also it a method using Speed Up Robust Features algorithm (SURF) finding match between original eye image input to the system with taking into account speed implementation its compatibility an scanner.

10.14257/ijsip.2016.9.12.10 article EN International Journal of Signal Processing Image Processing and Pattern Recognition 2016-12-31

The Internet of Things (IoT) was a new concept that connected various physical things to the internet.The IoT is fast expanding and will soon significantly impact everyday life.Although increasing number devices simplifying life, they risk our data.Radiofrequency identification (RFID) assists in automated devices.Furthermore, primary challenges for RFID tag-connected technology are privacy security.With improving safety solutions many apps, necessitates centralized database...

10.22266/ijies2023.0430.10 article EN International journal of intelligent engineering and systems 2023-02-25
Coming Soon ...