Lahieb Mohammed JawadAl-Nahrain University-Baghda -Iraq · Department of Computer Networks Engineering
Lahieb Mohammed Jawad
PhD Information Security
About
18
Publications
17,672
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
109
Citations
Introduction
Additional affiliations
July 2003 - present
Publications
Publications (18)
Video steganography is the common field of data security in digital communication where data include text, image, and video. Compressed video is the suitable modern source for hiding huge secret data that will trust security. This work proposed a compressed video steganography scheme for hiding cipher secret data in high security levels. The propos...
Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on text. It has been hypothesized that graphical passwords are more difficult to...
During the previous years in educational sectors, attendance is so related to the successful academic road. One of the most existing problems is when the students got absent intentionally in each class and they miss much rich information. In the traditional way followed by most universities, the attendance is based on the traditional paper's record...
Today, the transmission of video data with a huge size via limited bandwidth communication channels is
considered a core challenge. Hence, the compression technology is widely used for video applications and one of the
common efficient compression standards is H.264 that required to be protected. This paper focuses on classifying the
selective vide...
Securing the exchange of digital images in the form of huge multimedia data over the internet with limited bandwidth emerges as a significant and sensitive issue. In this paper, a new scan pattern method for protecting color image data based on the 3D-Lorenzo chaotic map method is proposed. The scan pattern method is used for generating three diffe...
Today, the use of video communication in real-time applications is rising at a rapid rate and most of these videos require secure transmissions like surveillance, video conferencing, video on demand, medical and military imaging systems. The trade-off between data security and real-time performance is the main challenge in this field. This paper pr...
Fast and secure data stored and transmission through a modern communication and information system are the core objective in this area. With regard to this study, efficient and simple algorithm has been suggested that takes advantage of double piecewise-linear chaotic map method and RC4 algorithm. Each algorithm is utilized as Pseudo Random-Number-...
Selective image encryption is an efficient way to reduce the amount of encrypted data that can achieve an acceptable level of security. Determining and choosing the region of interest in digital color images is a challenging task in selective image encryption due to their complex structure and distinct regions of varying importance based on instinc...
Abstract
E-tendering system is one of the e-Government project, which is a suitable
approach to obtain services and goods by the companies by addressing many
conventional paper-based issues. In this thesis, a detailed analysis of the
tendering process is done. The result is a secure and automated web-based
tendering system designed to link the orga...
Today, the wide exchange of data in both forms of texts and images over multimedia applications creates a significant need to develop encryption techniques that can protect the confidential data transmission from unauthorized access. This paper presents a secure image encryption scheme based on RC4 stream cipher and a new key generation model using...
Today, the security of digital images is considered more and more essential and a strong secret key plays a major role in the image encryption. In this paper, a novel method for generating dynamic non-linear secret keys for a symmetric block cipher using XOR-operation is proposed. The dynamic non-linear secret keys generation is based on a combinat...
Background/Objectives: Selective image encryption is the best modern approach for reducing the amount of encrypted area. The objective of this paper is to study the strength and limitationof the modern approach. Methods: This survey has mainly focuses on reviewing modern approaches in literature on selective encryption and classifies them into thre...
The quest for achieving an accurate and efficient algorithm in enhancing the security of colour image encryption is never-ending. We enhance the security level of conventional Blowfish algorithm (BA) for colour image encryption by modifying it with new F-function. The dynamic S-box and XOR operator are generated from the F-function via four-dimensi...
Securing digital image in exchanging huge multimedia data over internet with limited bandwidth is a significant and sensitive issue. Selective image encryption being an effective method for reducing the amount of encrypted data can achieve adequate security enhancement. Determining and selecting the region of interest in digital color images is cha...
Image encryption plays an important role to ensure confidential transmission and storage of image over internet. However, a real–time image encryption faces a greater challenge due to large amount of data involved. This paper presents a review on image encryption techniques of both full encryption and partial encryption schemes in spatial, frequenc...
With the revolution of information technology and wide area networking,
data has become less private where the access of media as well as the attempts to
change. A common technique used for video copyright protection is video logo
placement, where a logo indicating ownership is inserted into the video in a visible
way. Since the logo and its positi...
Questions
Question (1)
I performed 2 level 2D DWT on the cover image (gray) and performed 1 level 2D DWT on the secret image. On the lowest LL2 subband of cover I hide the LL1 subband of message using an encryption algorithm but I am having problem performing the inverse DWT operation. After the inverse operation I am not getting the proper image back. I am getting an image lost in noise. So how can I get proper recovered image?