Moatsum Alawida

Moatsum Alawida
Abu Dhabi University · Computer Sciences and Information Technology

PhD

About

29
Publications
11,079
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
617
Citations

Publications

Publications (29)
Article
Full-text available
Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws,...
Article
Full-text available
Modern block ciphers have been used to design security schemes to fulfil the security requirements in different areas of applications. The substitution boxes, significant components, used in block ciphers must have strong cryptographic strength so as to mitigate different attacks. There is no obvious distribution in the cryptographic properties of...
Article
Full-text available
Recognising handwritten digits or characters is a challenging task due to noisy data that results from different writing styles. Numerous applications essentially motivate to build an effective recognising model for such purposes by utilizing recent intelligent techniques. However, the difficulty emerges when using the Arabic language that suffers...
Article
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and timely area of research. Traditional countermeasures...
Article
Full-text available
Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, get the optimal performance of predictive models for classification tasks. FS is a vital and indispensable technique that ena...
Article
Image watermarking commonly involves singular value decomposition (SVD) because of its simplicity and minimal effect on image quality. However, SVD-based image watermarking schemes suffer from some drawbacks such as the false positive problem (FPP), and an undesirable trade-off between vital properties such as imperceptibility, embedding capacity,...
Article
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in IoT and its associated components. While the rapid evolution of IoTs has facilitated monumental opportunities for humanity, it has also acted as a catalyst precipitating diverse security iss...
Article
Full-text available
The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased...
Article
Full-text available
Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash functions and consensus protocols. Despite their popularity, mainstream protocols, such as Proof of Work or Proof of Stake still have drawbacks. Efforts to enhance these protocols led to the birth of alternative consensus protocols, catering to speci...
Article
Full-text available
Watermarking is an important technique for protecting sensitive e-multimedia data and intellectual property. Watermarking techniques are used for many applications such as ownership protection, which is a popular area of research as compared to others such as authentication and local temper localization. There are many image watermarking schemes th...
Article
Full-text available
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a chaotic sponge construction and DNA sequence. DNA sequence is used to design state transition rules of a deterministic chaotic finit...
Article
Full-text available
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant, DCFSAFWP due to its desirable chaotic properties. These properties are analogous to hash funct...
Article
Full-text available
A true random number generator (TRNG) is proposed, harvesting entropy from multicore CPUs to generate non-deterministic outputs. The entropy source is the unpredictable sequence of thread access when parallel threads attempt to access the same memory location, known as race condition or data races. Although prior work using the same entropy source...
Article
Full-text available
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustnes...
Article
Full-text available
Retrieving relevant information from trust-based Peer-to-Peer (P2P) networks is a challenging research task. The users on P2P networks endeavor to ensure that the peers have to provide guaranteed relevant information (or documents) for their information needs. Recent researches in evaluating the trustworthiness or even the reputation of peers lack...
Article
Full-text available
Image watermarking schemes based on singular value decomposition (SVD) have become popular due to a good trade-off between robustness and imperceptibility. However, the false positive problem (FPP) is the main drawback of SVD-based watermarking schemes. The singular value is the main cause of FPP issues because it a fixed value that does not hold s...
Article
Full-text available
Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a wide range of chaos-based hash functions in literature, most of them are designed in an ad hoc manner rather than relying on well-e...
Article
Full-text available
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as ps...
Article
Full-text available
Chaotic dynamics have been widely applied in various domains such as cryptography, watermarking and optimization algorithms. Enhancing chaotic complexity of simple one-dimensional (1D) chaotic maps has been a popular topic of research in recent years. However, most of the proposed methods have low complexity and are not suitable for practical appli...
Article
Full-text available
Digital chaotic maps are becoming increasingly popular in the area of cryptography due to commonalities but have drawbacks which adversely effect security strength. Thus, enhancing digital chaotic maps in terms of their chaoticity and statistical properties contributes towards the improvement of chaos-based cryptography. This paper proposes a bit r...
Article
Full-text available
Despite having many similar characteristics with cryptography, existing chaotic systems have many security issues that negatively affect the chaos-based cryptographic algorithms that utilize them. This paper proposes a new chaotification method that enhances the chaotic complexity of existing chaotic maps to surmount these issues. The proposed meth...
Article
Full-text available
Voice over Internet Protocol (VoIP) networks have recently emerged as a promising telecommunication medium for transmitting voice signal. One of the essential aspects that interests researchers is how to estimate the quality of transmitted voice over VoIP for several purposes such as design and technical issues. Two methodologies are used to evalua...
Article
Full-text available
Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which has high computational complexity. They also suffer from interoperability problems and are not easy to analyse from the binary poi...
Article
Full-text available
Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A chaos-based cipher derives its security strength from its underlying digital chaotic map, thus a more complex map leads to highe...
Article
Full-text available
Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces a hybrid chaotic system that enhances the dynamical behaviour of these maps to overcome this problem. The proposed system uses...
Conference Paper
Full-text available
The chaotic map has attracted more researchers in chaotic cryptography domain. That is because to large similarity among their characteristics such as unpredictability and sensitivity to an initial condition. Moreover, chaotic maps are a source of entropy that provide diffusion and confusion strength in cryptographic applications. Although existing...
Article
Full-text available
Image encryption provides confidentiality to images by transforming them into unrecognisable forms that resemble white noise. Digital chaos is one of the areas used to design image ciphers due to its many desirable properties such as ergodicity, initial state sensitivity and unpredictability. This paper proposes a new image cipher based on the pert...

Questions

Questions (3)
Question
The citation sometimes shows like (first author et al, year) (which is what I want) and sometimes it s shown like (all authors, year). I am using \citep and package is \bibliographystyle{apacite}
& \bibliographystyleown{apacite}. Any useful thoughts that would be appreciated.
Thank you
Question
I am working on digital chaotic map, sometimes i need to work on NIST suite , but the software can't install or work in my computer.
i need somebody help me to use this software , and suggest me others software suite use in evaluation randomly number.

Network

Cited By

Projects

Projects (2)
Project
We enhance classical chaotic maps in terms of complexity, chaoticity, nonlinearity and randomness for new cryptographic applications such as image encryption and hash function.
Project
Designing new cryptographic building blocks based on chaos theory for practical applications.