ArticlePDF Available

Hybrid, Secure and Highly Speed Method for Color Image Cryptography

Authors:
  • Al-Balqa Applied University

Abstract

A new method of color image cryptography will be produced, it will be shown the simplicity and easy use of this method, which can be used to encrypt-decrypt any image with any size without doing any changes in method operations. The proposed method will provide a high level of image protection by increasing the private key space to make the hacking process impossible. The proposed method will use two private keys to insure image protection, the first key will be a resized color image_key, the second key generated using chaotic logistic map model with a selected secrete parameters. The generated two 3D keys will be used to apply two rounds of XORing to encrypt-decrypt the color image. The proposed method will be implemented and the results will be analyzed. Several types of analysis (Quality, speed, correlation, speed, sensitivity, and simplicity) will be performed to prove the enhancements provided by the proposed method comparing with other existing methods of image cryptography
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 15
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 12, Issue. 9, September 2023, pg.15 38
Hybrid, Secure and Highly Speed Method
for Color Image Cryptography
Prof. Ziad AlQadi
Albalqa Applied University
Jordan Amman
DOI: https://doi.org/10.47760/ijcsmc.2023.v12i09.003
Abstract
A new method of color image cryptography will be produced, it will be shown the simplicity and easy use of this
method, which can be used to encrypt-decrypt any image with any size without doing any changes in method
operations. The proposed method will provide a high level of image protection by increasing the private key space to
make the hacking process impossible. The proposed method will use two private keys to insure image protection,
the first key will be a resized color image_key, the second key generated using chaotic logistic map model with a
selected secrete parameters. The generated two 3D keys will be used to apply two rounds of XORing to encrypt-
decrypt the color image. The proposed method will be implemented and the results will be analyzed. Several types
of analysis (Quality, speed, correlation, speed, sensitivity, and simplicity) will be performed to prove the
enhancements provided by the proposed method comparing with other existing methods of image cryptography
Keywords: Cryptography, PK, image_key, CLMM key, MSE, PSNR, CC, throughput
Introduction
Digital color image [2130]- is one of the most important types of digital data, it used in various applications, and it
requires high level of protection due the following:
1) The image may be very confidential.
2) The image may be private.
3) The image may be holding secret messages.
For these reasons and others more the image requires protection from being hacked by any third unauthorized party.
One the method of image protection is image cryptography, which means encrypting the image before sending, and
decrypting it after receiving. Cryptography can be done using one or more private keys (PK) and a selected
algorithm as shown in figure 1 [31-40].
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 16
The main contribution of this paper research is to introduce a new method of image cryptography, which will
enhance the process of color images cryptography by providing the following positive features [41-45]:
a) Keep the quality factors: mean square error (MSE), peak signal to noise ratio (PSNR), correlation coefficient (CC)
in the encryption phase (between the input and the encrypted images acceptable (MSE must be very high, PSNR
must very low and CC must be closed to zero), while in the decryption phase MSE must be equal zero, PSNR must
be equal infinite and CC must be equal zero, the quality between two images can be measured using equations 1, 2,
and 3 [46-55].
Figure 1: Image cryptography
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 17
Where:
b) The method must be highly secure: The PK must provide a huge key space so that it cannot be guessed or hacked.
The private key will be hybrid, sensitive to any changes in the parameters values used to generate the key.
c) The proposed method will minimize the encryption-decryption and maximize the throughput, the provided
throughput will be better than the throughputs provided by other existing methods.
d) Simple to use and implement, the method will suit any image with any length, changing the image does not require
any modification in the method sequence of operation.
The image is processed easily and without any difficulties, because the digital image can be represented (as shown
in figure 2) by a three-dimensional matrix (a two-dimensional matrix for each of the three colors: red, green and
blue)[56-63].
Figure 2: 3D matrix to represent color image
Color image includes a huge number of pixels, each pixel as shown in figure 3 requires 3 bytes of memory to be
stored, and the value of the pixel is a result of mixing the three colors as shown in figures 4 and 5 [64-70]. The
pixel’s color values will be an integer value within the range 0 to 255, so it is better to use an integer key to be used
for color image cryptography [71-75].
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 18
Figure 3: Color pixel
Figure 4: Mixing colors to for the pixel color
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 19
Figure 5: Pixel components
Image cryptography is a pixel operation; each pixel in the image to be encrypted-decrypted must be processed.
Digital images usually have a huge size, so we have to seek a method to decrease both the encryption and decryption
times [74-80]. The faster approach of image cryptography is XORing image with a secret private key, if the
cryptography is implemented in burst way by using a key with size equal image size then we will save a lot of time,
here the key size must match any other image (to be encrypted) size [81-88]. Image resizing can be easily
implemented using built in matlab function 'imresize', and it can be used to reduce or expand the image size as
shown in figure 6.
Figure 6: Image resizing
Related Work
A lot of methods for data cryptography were introduced, some of these methods were based on data cryptography
standards such as DES, 2DES, AES and BF, these methods are good for encrypting-decrypting small is size data,
using these methods for data with big size (digital image) will require big time and the throughput will be very low,
in [1] a comparative analysis of standard methods of data cryptography was provided and it was shown that the
average throughputs of DES, 3DES, AES and BF were 835, 282, 491, and 1038 bytes per second respectively.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 20
In [2] a performance comparison between chaotic and non-chaotic methods of data cryptography was done and it
was shown that the average throughputs of non-chaotic, chaotic and hyper chaotic methods were 170.3, 141.2 and
636.3 K bytes per second respectively, which are better than standard methods.
Some other methods were introduced to enhance the cryptography throughputs, in [8] the authors introduced a
method, the throughput was enhanced to reach 169.1 K bytes per second, while in [9] the introduced method
enhanced the throughput to reach 710 K bytes per second.
Faster methods were introduced; these methods were used to minimize the encryption-decryption times and to
maximize the throughput of data cryptography, in [3] the authors provided a robust and fast image encryption
scheme based on a mixing technique. In [4] the authors provided cosine-transform-based chaotic system for image
encryption, while in [5] the authors introduced a novel image encryption algorithm based on polynomial
combination of chaotic maps and dynamic function generation. In [6] the authors introduced Multiple-image
Encryption Algorithm Based on DNA Encoding and Chaotic System, while in [7] the authors produced a multiple-
image encryption with bit-plane decomposition and chaotic maps, these methods provided good quality a have
various speeds as shown in table 1.
The Proposed Method
The proposed method will use two rounds of color image cryptography as shown in figure 7.
Figure 7: Proposed diagram of the proposed method
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 21
The first round will use the first secret key which is generated by using chaotic logistic map model (CLMM) using
the selected secret chaotic parameters R, C, r and x, here R and C point to the 3D chaotic key dimensions, r and x
are the growth rate and the initial population of CKMM which can be calculated using equation 4:
The second round will use the output image of the first round, this image will be XORed by the second secret key,
and this key must be generated from a secret image_key by resizing this image to match the sizes of the image to be
encrypted-decrypted [9-12].
Using these two keys will increase the level of security or the following reasons:
- The image-key is to be kept in secret and without transmission, the generated key from this image will have the
image to be encrypted size, so it is impossible to guess or hack this key.
- The second key is generated by applying CLMM parameters, these parameters have a double data type and 64 bits
are reserved for each parameter, so the CLMM parameters will provide a key with a huge key space, hacking or
guessing this space will be a very difficult target.
The first key is sensitive to the selecting image_key, changing this image will totally change the first key. The
second key is very sensitive to any change in one or more of the CLMM parameters, any minor change in one or
more parameters values will lead to change the second secret key.
The second secret key is generated by applying the CLMM using a selected secret values of the chaotic parameters,
applying these values will generate a 3D CLLM key, the obtained key then must be converted to integers and
resized to match the size of the image to be encrypted, figures 8 thru show an example of second key generation:
Figure 8: 3D chaotic key example
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 22
Figure 9: Chaotic key converted to integers
Figure 10: Resized integer key
The proposed method of image cryptography can be implemented applying the following algorithm:
Inputs
Image to be encrypted/decrypted, CLMM parameters values, image_key
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 23
Output:
Encrypted/decrypted image
Process
1) Get the image to be encrypted/decrypted
2) Retrieve the image size
3) First secret key generation
a) Get the image key
b) Resize the image_key to the image size to obtain key 1
4) Second secret key generation:
a) Get the CLLM parameters (R, C, r and x)
b) Apply CLMM model to obtain CLMM key
c) Convert CLMM key to integers
d) Resize the integer key to match the image size.
5) Apply XORing the encrypted/decrypted image to get decrypted/encrypted image (Round 1)
6) Apply XORing the decrypted/encrypted image using the results of step 5 to get the encrypted/decrypted image
(round 2)
For researchers who want to reproduce the methods outputs the following mat lab code can be used:
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 24
Implementation and Results Analysis
Different images with various sizes were selected (figures 11 the selected images), these images were treated using
the proposed method. Below we will provide a detail analysis of the obtained experimental results.
Figure 11: Selected images
1) Quality analysis
The image “sampleMerry_0055_Lasalle.jpg” was selected as an image_key, the following were selected as CLMM
parameters value:
R=40; C=50, H=3; r1=3.9; x1=0.025;
Figure 12 shows the used image_key
The selected images were encrypted-decrypted using the proposed method, MSE, PSNR were calculated in the
encryption and decryption phase. In the decryption phase the values of MSE were always equal zero, while the
values of PSNR were always equal infinite, table 2 shows the calculated values of MSE and PSNR between the
input and the encrypted images:
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 25
Figure 12: Used image_key
Table 2: MSE and PSNR between input and encrypted images
Image
MSE
PSNR
1
13309
15.8634
2
11161
17.6235
3
98012
18.9226
4
97820
18.9423
5
84066
20.4576
6
12345
16.6151
7
11802
17.0651
8
96359
19.0927
9
11898
16.9836
10
69213
22.4018
Figures 13, 14 and 15 show a sample outputs
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 26
Figure 13: Input image (example)
Figure 14: Encrypted image (example)
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 27
500 1000 1500
200
400
600
800
1000
0
1
2
3
4
x 104
0100 200
0
1
2
3
4
x 104
0100 200
0
1
2
3
4
x 104
0100 200
Figure 15: Decrypted image (example)
From table 2 and figures 12 to 14 we can see that the proposed method totally destroyed the input image when
encrypting it, this is proved by the low values PSNR and the high values of MSE. In the decryption phase the images
were totally recovered, this is proved by a zero MSE and infinite PSNR.
The obtained here results prove that the proposed method satisfies the quality requirements of good method of image
cryptography.
2) Sensitivity Analysis
The proposed method is very sensitive in any changes in the image_key and CLMM parameters values, any minor
changes in them in the decryption phase will produce damaged decrypted images, these changes will be co nsidered
as a hacking attempt.
Image 10 was encrypted using the key_image shown in figure 12, and using the CLMM parameters:
(R=40;C=50,H=3;r1=3.9;x1=0.025), the decryption phase use image 9 as an image_key, figures 16, 17 and 18 show
the generated outputs:
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 28
Figure 16: Input image (image 10)
Figure 16: Encrypted image using first image_key
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 29
Figure 17: Decrypted image using second image_key
As we can see from figure 17, the process of decryption is sensitive to changing the image_key, changing the
image_key will produce a corrupted damaged decrypted image (with low values of PSNR and CC and high values
of MSE).
Now we will see how the process of cryptography is very sensitive to any changes in CLMM parameters required to
generate the second secret key.
Image 10 was encrypted using image_key shown in figure 11, the parameters :( CLMM 1=
R=40;C=50,H=3;r1=3.9;x1=0.025) were used in the encryption phase, while the parameters: (CLMM
2=R=40;C=50,H=3;r1=3.9;x1=0.037) were used in the decryption phase, figures 18 and 19 show the obtained
images:
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 30
Figure 18: Encryption using CLMM 1
Figure 19: Decryption using CLMM 2
As we can see from figure 19 the decrypted image is a damage image with unacceptable quality.
3) Statistical Analysis
A good method of image cryptography must provide good values of CC between images colors in the encryption
and decryption phases, the values of CCs in the encryption phase must be closed to zero (very low), while in the
decryption phase the values of CCs must equal 1, table 3 shows the proposed method of encrypting-decrypting the
selected images, the results show that the proposed method gives an excellent values of CCs, and that the proposed
method totally destroys the image in the encryption phase, and totally recover the image in the decryption phase.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 31
Table 3: Obtained CCs
Image
Between input and encrypted image
RED CC
Green CC
Blue CC
RED CC
Green CC
Blue CC
1
0.0131
-0.0057
-0.0746
1
1
1
2
0.0033
-0.0261
-0.0309
1
1
1
3
0.0151
-0.0113
-0.0520
1
1
1
4
0.0217
-0.0299
-0.0659
1
1
1
5
0.0075
0.0117
-0.0270
1
1
1
6
0.0172
-0.0223
-0.0380
1
1
1
7
0.0143
-0.0141
-0.0775
1
1
1
8
0.0369
-0.0285
-0.0553
1
1
1
9
0.0097
-0.0082
-0.0484
1
1
1
10
0.0028
-0.0041
-0.0114
1
1
1
4) Speed Analysis
In this section we will prove how the proposed method enhances the cryptography efficiency by decreasing the
encryption/decryption time and increasing the cryptography throughput (encrypted/decrypted byte is a second,
which is equal image size divided by encryption time).
The CLMM key requires time for generation, this time will increase when increasing the CLMM key, so it is
recommended to use a CLMM key with small size, this size can be resized to match the image size, doing this we
can optimize the total time of encryption, to see that various CLLM keys were generated, table 4 shows the expected
key generation time.
Table 4: CLMM key generation
Size
Number of elements
Generation time (second)
10x10x3
300
0.000001
40x50x3
6000
0.001000
60x80x3
14400
0.003000
80x80x3
19200
0.004000
100x100x3
30000
0.005000
200x200x3
120000
0.046000
300x200x3
180000
0.104000
500x500x3
750000
0.995000
500x1000x3
1500000
2.152000
From table 4 we can see that CLLM key generation time will rapidly increase when increasing the key size (see
figure 20), so it is better to select a key with small size.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 32
Figure 20: CLMM key generation time vs key length
The selected images were treated using the proposed method, the encryption and decryption phases used image_key
shown in figure 12, the CLMM parameters were :( R=40; C=50, H=3; r1=3.9; x1=0.025), the encryption time was
measured; table 5 shows the obtained results (the decryption time was equal the encryption time):
Table 5: Speed results
Image
Encryption time
Throughput(K byte per second)
1
0.0430
3425.9
2
0.0440
11506
3
0.0530
94723
4
0.0520
81246
5
0.0430
2776.7
6
0.0420
12054
7
0.0430
3428.8
8
0.0420
3510.4
9
0.0460
40124
10
0.0570
104840
Average
0.0465
35763
From table 5 we can see that the proposed method enhanced the throughput of the image cryptography, the proposed
method has a significant speed up comparing with method mentioned in the related work part and as shown in table
6:
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 33
Table 6: Throughput (speed) comparisons
Method
Throughput
Speedup of the proposed method
Proposed
35763
1
In [3]
888.8867
40.23347407492991
In [4]
668.4082
53.50472959487930
In [5]
911.0352
39.25534381108436
In [6]
360.4102
99.22860118831265
In [7]
384.9609
92.90034390505633
Increasing the CLMM key length will keep the method quality high, but the encryption time will be increased, thus
the throughput will decrease and it will remain better than the throughputs of the introduced methods in [3 -7] (see
table 8).
The selected images were treated using other CLMM parameters: (R=240; C=250, H=3; r1=3.9; x1=0.025), these
images were treated using the proposed method; table 7 shows the obtained results:
Table 7: Speed results using another CLMM key
Image
Encryption time
Throughput(K byte per second)
1
0.1370
1075.3
2
0.1300
3894.2
3
0.1370
36645
4
0.1910
22119
5
0.1260
947.6144
6
0.1580
3204.1
7
0.1270
1160.9
8
0.1290
1142.9
9
0.1600
11536
10
0.1410
42382
Average
0.1436
12411
Table 8: Throughput (speed) comparisons (using bigger CLMM key)
Method
Throughput
Speedup of the proposed method
Proposed
12411
1
In [3]
888.8867
13.9624
In [4]
668.4082
18.5680
In [5]
911.0352
13.6230
In [6]
360.4102
34.4358
In [7]
384.9609
32.2396
5) Security Analysis
The proposed method uses two keys to apply image cryptography. The first key is to be generated from a secret
image_key, which is to be kept in secret between the sender and receiver without transmission, the generated key
from this image is a 3D matrix, this matrix cannot be guessed or hacked because it has a huge key space.
The second key is to generated by running the CLMM with a secrete parameters, each parameter has a double data
type which requires 64 bits for representation , thus the number of combinations will be high, and a high number of
combinations will provide a big key space which is difficult to guess or to hack.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 34
The used two keys are very sensitive to any change, any changes in one or in the two keys in the decryption phase
will be considered as a hacking attempt and a damaged, corrupted decrypted image will be produced.
6) Simplicity Analysis
The proposed method can be implemented in a simple sequence of operations, and it can be implemented using any
programming language. The proposed sequence can be used to encrypt-decrypt any image with any size (color or
gray images), it is very easy to change the image to be encrypted, the image_key and the CLMM parameters,
changing one or more of these input does not require any changes in the sequence of operation.
Conclusion
A simple and easy to implement method of image cryptography was introduced, the method can use any image, an
image_key and any CLMM parameters, changing one or more input does not require any changes in the method
algorithm. The proposed method used two secret keys to secure the image, the first key is huge key generated from
a secret image_key, the second is CLMM key generated by a selected secret chaotic parameters, the two key
provided a huge key space, this key space will provide a high degree of image security and protection.
The proposed method provided an excellent quality, the obtained MSE, PSNR, and CC values in the encryption and
decryption phases satisfied the quality requirements, the proposed method total destroyed the image in the
decryption phase, and totally recovers the original image in the decryption phase.
The proposed method gave on optimal encryption-decryption time and it enhanced the throughput of cryptography,
the obtained results were compared with other existing method, and it was shown that the proposed method has a
significant speed up.
The obtained results were analyzed, the results of analysis proved the proposed method provided enhancements.
References
[1]. Aamer Nadeem, Dr M. Younus Javed, A Performance Comparison of Data Encryption Algorithms,
Conference Paper · September 2005 DOI: 10.1109/ICICT.2005.1598556 · Source: IEEE Xplore.
[2]. M. Bala Kumara, P. Karthikkab , N. Dhivyac , T. Gopalakrishnan, A Performance Comparison of
Encryption Algorithms for Digital Images, International Journal of Engineering Research & Technology
(IJERT), Vol. 3 Issue 2, February 2014.
[3]. Lee Mariel Heucheun Yepdia, Alain Tiedeu, and Guillaume Kom, A Robust and Fast Image Encryption
Scheme Based on a Mixing Technique, Security and Communication Networks, Volume 2021 |Article
ID 6615708 | https://doi.org/10.1155/2021/6615708
[4]. Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image
encryption,” Information Sciences, vol. 480, pp. 403419, 2019.
[5]. M. Asgari-chenaghlu, M.-A. Balafar, and M.-R. Feizi-Derakhshi, “A novel image encryption algorithm
based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing,
vol. 157, p. 1, 2019.
[6]. X. Zhang and X. Wang, Multiple-image Encryption Algorithm Based on DNA Encoding and Chaotic
System, Springer, New York, NY, USA, 2019.
[7]. J. S. Zhenjun and R. Sun, “Multiple-image encryption with bit-plane decomposition and chaotic
maps,” Optics and Lasers in Engineering, vol. 80, pp. 111, 2016.
[8]. Rania A. Elmanfaloty, Ehab Abou-Bakr, An Image Encryption Scheme Using a 1D Chaotic Double
Section Skew Tent Map, Complexity, Volume 2020 |Article
ID 7647421 | https://doi.org/10.1155/2020/7647421.
[9]. Vijayalakshmi, C., Lavanya, L., Navya, C.: A Hybrid Encryption Algorithm Based On AES and RSA.
International Journal of Innovative Research in Computer and Communication Engineering 4(1), 909-917
(2016).
[10]. Stallings, W. (2014) Cryptography and Network Security Principles and Practice, Sixth Edition, prentice
Hall, Upper Saddle River.
[11]. Forouzan, B.A. (2007) Cryptography and Network Security, Special Indian Edition, Tata McGraw-Hill
Publishing Company Limited, New Delhi.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 35
[12]. Mathur, M. and Kesarwani, A. (2013) Comparison between DES, 3DES, RC2, RC6, Blowfish and AES.
Proceedings of National Conference on New Horizons in IT, NCNHIT, Mumbai, September 2013, 143-
148.
[13]. Naseem Asad, Ismail Shayeb, Qazem Jaber, Belal Ayyoub, Ziad Alqadi, Ahmad Sharadqh, creating a
Stable and Fixed Features Array for Digital Color Image, IJCSMC, Vol. 8, Issue. 8, August 2019, pg.50
62.
[14]. Ziad A. Alqadi, Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, Optimized True-RGB
color Image Processing, World Applied Sciences Journal 8 (10): 1175-1182, ISSN 1818-4952, 2010.
[15]. A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using a New R'G'I Model”, Journal of
Computer Science, Vol.5, No. 4, pp. 250-254, 2009.
[16]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of
Color Image Steganography, JCSMC, Vol.5, Issue. 11, November 2016, pg.3743.
[17]. Ziad A. Alqadi Mua’ad M. Abu-Faraj, Rounds Reduction and Blocks Controlling to Enhance the
Performance of Standard Method of Data Cryptography, International Journal of Computer Science and
Network Security, vol. 21, issue 12, pp. 648-656, 2021.
[18]. Ziad Alqadi Mua’ad Abu-Faraj , Khaled Aldebei, DEEP MACHINE LEARNING TO ENHANCE ANN
PERFORMANCE: FINGERPRINT CLASSIFIER CASE STUDY, JOURNAL OF SOUTHWEST
JIAOTONG UNIVERSITY, vol. 56, issue 6, pp. 686-694, 2021.
[19]. Ziad A. Alqadi Mua’ad M. Abu-Faraj, Improving the Efficiency and Scalability of Standard Methods for
Data Cryptography, International Journal of Computer Science and Network Security, vol. 21, issue 12, pp.
451-458, 2021.
[20]. Mua’ad M. Abu-Faraj Prof. Ziad Alqadi, Using Highly Secure Data Encryption Method for Text File
Cryptography, International Journal of Computer Science and Network Security, vol. 20, issue 11, pp. 53-
60, 2021.
[21]. Kaur, R. Dhir, & G. Sikka,“A new image steganography based on first component alteration technique”,
International Journal of Computer Science and Information Security (IJCSIS), 6, pp.53-56,
2009.http://arxiv.org/ftp/arxiv/papers/1001/1001.1972.pdf
[22]. Alvaro Martin, Guillermo Sapiro, &GadielSeroussi,“Is Steganography Natural”, IEEE Transactions on
Image Processing, 14(12), pp.2040-2050, 2005.doi: 10.1109/TIP.2005.859370
[23]. Bhattacharyya, A. Roy, P. Roy, & T. Kim,“Receiver compatible data hiding in color image”, International
Journal of Advanced Science and Technology, 6, pp.15-24,
2009.http://www.sersc.org/journals/IJAST/vol6/2.pdf
[24]. EE. KisikChang, J. Changho, & L. Sangjin,“High Quality Perceptual Steganographic Techniques”,
Springer. 2939, pp.518-531, 2004.doi: 10.1007/978-3-540-24624-4_42,
http://www.springerlink.com/content/c6guuj5xnyy4wj3c/
[25]. C. Kessler,“Steganography: Hiding Data within Data” An edited version of this paper with the title "Hiding
Data in Data", Windows & .NET Magazine, 2001. [Online] Available:
http://www.garykessler.net/library/steganography.html (October 4,2011)
[26]. Gandharba Swain, &S.K.lenka,“Steganography-Using a Double Substitution Cipher”, International Journal
of Wireless Communications and Networking. 2(1), pp.35-39, 2010. ISSN: 0975-7163.
http://www.serialspublications.com/journals1.asp?jid=436&jtype
[27]. Hideki Noda, MichiharuNimi, &EijiKawaguchi,“High- performance JPEG steganography using
Quantization index modulation in DCT domain”, Pattern Recognition Letters, 27, pp.455-46,
2006.http://ds.lib.kyutech.ac.jp/dspace/bitstream/10228/450/1/repository6.pdf
[28]. Kathryn,“A Java Steganography Tool”, 2005.http://diit.sourceforge.net/files/Proposal.pdf
[29]. Motameni, M.Norouzi, M.Jahandar, & A. Hatami,“Labeling method in Steganography”, Proceedings of
world academy of science, engineering and technology, 24, pp.349-354, 2007. ISSN 1307-6884.
http://www.waset.org/journals/waset/v30/v30-66.pdf
[30]. Mohammed A.F Al Husainy, "Message Segmentation to Enhance the Security of LSB Image
Steganography", International Journal of Advanced Computer Science and Applications, 3(3): 57-62,
2012.http://www.ijacsa.thesai.org
[31]. Mohammed A.F Al Husainy, "Developed Segmented LSB Image Steganography", International Science
and Technology Conference (ISTEC 2012), Dubai, December 13-15, 2012. http://www.iste-c.net
[32]. Afjal H. Sarower; Rashed Karim; Maruf Hassan, An Image Steganography Algorithm using LSB
Replacement through XOR Substitution, Computer Science:2019 International Conference on Information
and Communications Technology (ICOIACT), DOI:10.1109/icoiact46704.2019.8938486.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 36
[33]. Rashad J. Rasras1, Mutaz Rasmi Abu Sara2, Ziad A. AlQadi3, Rushdi Abu zneit, Comparative Analysis of
LSB, LSB2, PVD Methods of Data Steganography, International Journal of Advanced Trends in Computer
Science and Engineering, vol. 8, issue 3 ,2019, https://doi.org/10.30534/ijatcse/2019/64832019
[34]. Ziad A. Alqadi, Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, 2010, Optimized True-
RGB color Image Processing, World Applied Sciences Journal8 (10): 1175-1182, ISSN 1818-4952.
[35]. Waheeb, A. and Ziad AlQadi, 2009. Gray image reconstruction, Eur. J. Sci. Res., 27: 167-173.
[36]. Akram A. Moustafa and Ziad A. Alqadi, Color Image Reconstruction Using A New R'G'I Model, Journal
of Computer Science 5 (4): 250-254, 2009 ISSN 1549-3636.https://doi.org/10.3844/jcs.2009.250.254
[37]. Musbah J. Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using
Image Segmentation and Matrix Multiplication, International Journal of Engineering & Technology,
7(3.13) (2018) 104-107.https://doi.org/10.14419/ijet.v7i3.13.16334
[38]. Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein,A COMPARISON BETWEEN PARALLEL
ANDSEGMENTATIONMETHODS USED FOR IMAGE ENCRYPTION-DECRYPTION International
Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5,October 2016.
[39]. Khaled Matrouk, Abdullah Al- Hasanat, HaithamAlasha'ary, Ziad Al-Qadi, Hasan Al-Shalabi, Analysis of
Matrix Multiplication Computational Methods, European Journal of Scientific Research, ISSN 1450-216X
/ 1450-202X Vol.121 No.3, 2014, pp.258-266.
[40]. Ziad A.A. Alqadi, Musbah Aqel, and Ibrahiem M. M. ElEmary, Performance Analysis and Evaluation of
Parallel Matrix Multiplication Algorithms, World Applied Sciences Journal 5 (2): 211-214, 2008.
[41]. Z Alqadi, A Abu-Jazzar, Analysis of program methods used in optimizing matrix multiplication, Journal of
Engineering, 2005.
[42]. Musbah J. Aqel , Ziad A. Alqadi, Ibraheim M. El Emary, Analysis of Stream Cipher Security Algorithm,
Journal of Information and Computing Science Vol. 2,No. 4, 2007, pp. 288-298.
[43]. J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, A Novel zero-error method to create a secret
tag for an image, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081 -
4091, 2018.
[44]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of
Color Image Steganography, JCSMC, Vol.5, Issue. 11, November 2016, pg.3743.
[45]. M. Jose, “Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality”,
International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014.
[46]. Emam, M. M., Aly, A. A., & Omara, F. A. An Improved Image Steganography Method Based on LSB
Technique with Random Pixel Selection. International Journal of Advanced Computer Science
&Applications,1(7), pp. 361-366, (2016). https://doi.org/10.14569/IJACSA.2016.070350
[47]. Mohammed Abuzalata; Ziad Alqadi; Jamil Al-Azzeh; Qazem Jaber, Modified Inverse LSB Method for
Highly Secure Message Hiding, IJCSMC, Vol. 8, Issue.2, February 2019, pg.93 103
[48]. Rashad J. Rasras, Mutaz Rasmi Abu Sara, Ziad A. AlQadi, Engineering, A Methodology Based on
Steganography and Cryptography to Protect Highly Secure Messages Engineering Technology & Applied
Science Research, Vol.9 Issue 1, Pages 3681-3684, 2019.
[49]. Zhou X, Gong W, Fu W, Jin L. 2016An improved method for LSB based color image steganography
combined with cryptography. In 2016 IEEE/ACIS 15thInt. Conf. on Computer and Information Science
(ICIS), Okayama, Japan, pp. 14 .https://doi.org/10.1109/ICIS.2016.7550955
[50]. Wu D-C, Tsai W-H. A stenographic method for images by pixel value differencing. Pattern Recognition.
Lett. 24, 16131626. 2003https://doi.org/10.1016/S0167-8655(02)00402-6
[51]. Das R, Das I. Secure data transfer in IoT environment: adopting both cryptography and steganography
techniques. In Proc. 2nd Int. Conf. on Research in Computational Intelligence and Communication
Networks, Kolkata, India, pp. 296301, 2016.https://doi.org/10.1109/ICRCICN.2016.7813674.
[52]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length
Private Key,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3,
pp. 138-151, 2022.
[53]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of
Southwest Jiaotong University, vol. 57, no. 1, pp. 24-33, 2022.
[54]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of
Image Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[55]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Pur- posed
Method on Data Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 37
[56]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance:
Fingerprint Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694,
2021.
[57]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction
Methods,” Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
[58]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- ods for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 ,
pp. 451-458, 2021.
[59]. Abdullah N. Olimat, Ali F. Al-Shawabkeh, Ziad A. Al-Qadi, Nijad A. Al-Najdawi, Forecasting the
influence of the guided flame on the combustibility of timber species using artificial intelligence, Case
Studies in Thermal Engineering, Volume 38, 2022, 102379, ISSN 2214-157X,
https://doi.org/10.1016/j.csite.2022.102379.
[60]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length
Private Key,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3,
pp. 138-151, 2022.
[61]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of
Southwest Jiaotong University, vol. 57, no. 1, pp. 24-33, 2022.
[62]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of
Image Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[63]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Purr- posed
Method on Data Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
[64]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance:
Fingerprint Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694,
2021.
[65]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- odds for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 ,
pp. 451-458, 2021.
[66]. J. Vilkamo and T. Bäckström, “Time-Frequency Processing: Methods and Tools,” in Parametric Time-
Frequency Domain Spatial Audio, V. Pulkki, S. Delikaris-Manias, and A. Politis, Eds. Wiley, 2017, pp. 3
24.
[67]. K Matrouk, A Al-Hasanat, H Alasha'ary, Ziad Al-Qadi, H Al-Shalabi, Speech fingerprint to identify
isolated word person, World Applied Sciences Journal, 31 (10), 1767-1771, 2014.
[68]. Ziad alqadi, Analysis of stream cipher security algorithm, Journal of Information and Computing Science,
vol. 2, issue 4, pp. 288-298, 2007.
[69]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh, A Novel Based On Image
Blocking Method to Encrypt-Decrypt Color, International Journal on Informatics Visualization, vol. 3,
issue 1, pp. 86-93, 2019.
[70]. Musbah J Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using
Image Segmentation and Matrix Multiplication, International Journal of Engineering and Technology, vol.
7. Issue 3.13, pp. 104-107. 2018.
[71]. Jihad Nadir, Ashraf Abu Ein, Ziad Alqadi, A Technique to Encrypt-decrypt Stereo Wave File, International
Journal of Computer and Information Technology, vol. 5, issue 5, pp. 465-470, 2016.
[72]. Saleh Khawatreh, Belal Ayyoub, Ashraf Abu-Ein, Ziad Alqadi, A Novel Methodology to Extract Voice
Signal Features, International Journal of Computer Applications, vol. 975, pp. 8887, 2018.
[73]. Majed O. Al-Dwairi, Amjad Y. Hendi, Mohamed S. Soliman, Ziad A.A. Alqadi, A new method for voice
signal features creation, International Journal of Electrical and Computer Engineering (IJECE), vol. 9. Issue
9, pp. 4092-4098, 2019.
[74]. Aws Al-Qaisi, Saleh A Khawatreh, Ahmad A Sharadqah, Ziad A Alqadi, Wave File Features Extraction
Using Reduced LBP, International Journal of Electrical and Computer Engineering, vol. 8. Issue 5, pp.
2780-2787, 2018.
[75]. Ayman Al-Rawashdeh, Ziad Al-Qadi, using wave equation to extract digital signal features, Engineering,
Technology & Applied Science Research, vol. 8, issue 4, pp. 1356-1359, 2018.
[76]. Ashraf Abu-Ein, Ziad AA Alqadi, Jihad Nader, A TECHNIQUE OF HIDING SECRETE TEXT IN WAVE
FILE, International Journal of Computer Applications, 2016.
[77]. Ismail Shayeb, Ziad Alqadi, Jihad Nader, Analysis of digital voice features extraction methods,
International Journal of Educational Research and Development, vol. 1, issue 4, pp. 49-55, 2019.
Prof. Ziad AlQadi, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.9, September- 2023, pg. 15-38
© 2023, IJCSMC All Rights Reserved 38
[78]. Jihad Nader Ahmad Sharadqh, Ziad Al-Qadi, Bilal Zahran, Experimental Investigation of Wave File
Compression-Decompression, International Journal of Computer Science and Information Security, vol.
14m issue 10, pp. 774-780, 2016.
[79]. Ziad A AlQadi Amjad Y Hindi, O Dwairi Majed, PROCEDURES FOR SPEECH RECOGNITION USING
LPC AND ANN, International Journal of Engineering Technology Research & Management, vol. 4, issue
2, pp. 48-55, 2020.
[80]. Majed O Al-Dwairi, A Hendi, Z AlQadi, an efficient and highly secure technique to encrypt-decrypt color
images, Engineering, Technology &Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[81]. Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, a novel simple and highly secure
method for data encryption-decryption, International Journal of Communication Networks and Information
Security, vol. 11, issue 1, pp, 232-238, 2019
[82]. Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, USING SPEECH
SIGNAL HISTOGRAM TOCREATE SIGNAL FEATURES, International Journal of Engineering
Technology Research & Management, vol. 4, issue 3, pp. 144-153, 2020.
[83]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction
Methods,” Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
[84]. Alqadi, Z. (2019). A new method for voice signal features creation. International Journal of Electrical and
Computer Engineering (IJECE), 9(5): 4092-4098.https://doi.org/10.11591/ijece.v9i5.pp4092-4098.
[85]. Alqadi, Z. (2009). A practical approach of selecting the edge detector parameters to achieve a good edge
map of the gray image. Journal of Computer Science, 5(5): 355-362.
[86]. Zaini, H., Alqadi, Z.A. (2021). Efficient WPT based speech signal protection. IJCSMC, 10(9): 53-
65.https://doi.org/10.47760/ijcsmc.2021.v10i09.006.
[87]. Zneit, R.A., Khrisat, M.S., Khawatreh, S.A., Alqadi, Z.(2020). Two ways to improve WPT decomposition
used for image features extraction. European Journal of Scientific Research, 157(2): 195-205.
[88]. Hindi, A., Qaryouti, G.M., Eltous, Y., Abuzalata, M.,Alqadi, Z. (2020). Color image compression using
linear prediction coding. International Journal of Computer Science and Mobile Computing, 9(2): 13-20.
... Data steganography as shown in figure 5 means hiding the secret message in covering media (color image) before sending the message and extracting the message from the stego_image after receiving the image [22][23][24][25][26][27]. Any method of data steganography is considered as a good and acceptable method if it satisfies the following requirements [35][36][37][38][39][40]: ...
Article
Full-text available
Data steganography is widely used in message protection from being read, and mostly used methods based on LSB and LSB2 methods are not enough secure. In this research paper a modified LSB2 method will be introduced. This method will use a complex complicated key to enhance the data protection degree. The key will be used to rearrange the message stream of bits before data hiding and before data extraction. The key will be sensitive to any minor changes giving a corrupted unreadable message when any change was done in the data extraction phase o data steganography phases. It will be shown that the proposed method very efficient comparing with other methods base on LSB or LSB2 methods. The proposed method will add an improvements to the process of steganography by reducing both the hiding and extracting times. It will be shown that the proposed modified LSB2 method will be used to treat any message short or long using any color image, the size of the used covering image will not affect the method efficiency, so we can use bigger covering images to enhance the quality of the stego image by optimizing the value of MSE and PSNR. The proposed method will be implemented and various analysis will be introduced to prove the improvements achieved by the proposed method.
Article
Full-text available
This paper anticipates the burning rate and optical obscuration characteristics of a 10 mm thick timber species often used in buildings under the influence of a guided flame condition with heat fluxes of 25 kW/m² and 50 kW/m². The smoke density chamber was used to test the wood species Pinus strobus, Pinus kesiya, Quercus alba, and Faqus sylvatica. The experimental data: time, specific gravity, mass loss, and heat flow were used as input variables to an artificial neural network (ANN) model. ANN with structure of 4-64-32-2 was built and validated, the results revealed that, the correctness of the established simulation was proven by a high value of R² (0.99292 for validation) and highest validation performance (MSE = 17.809 at epoch 12). When the heat flow was reduced from 50 kW/m² to 25 kW/m², Quercus had the greatest drop in mass optical density (MOD). In the case of 25 kW/m², the average charring rate was roughly 0.57 mm/min, compared to 0.96 mm/min in the case of 50 kW/m². The MOD declines asymptotically for all species regardless of heat flux. The findings give statistical support and theoretical reference for fire-related construction norms and standards.
Article
Full-text available
Some digital data circulated through various social media, regardless of its nature, requires high-level protection and security for various reasons. In this research, a multi-purpose method will be presented to be used in encrypting SMS messages, text files regardless of their size, digital images of all kinds and sizes, and audio files of all kinds and sizes. The proposed method will be examined to prove its efficiency, and the practical results will be compared with the implementation results of other internationally approved methods to show the extent to which the method improves efficiency indicators. It will be shown how to use digital color image to generate a highly secure private key which will make the process of hacking impossible. The Quality of the encrypted and decrypted images will be examined to justify the use of the proposed method.
Article
Full-text available
Color digital images are used in many multimedia applications and in many vital applications. Some of these applications require excellent protection for these images because they are confidential or may contain confidential data. In this paper, a new method of data cryptography is introduced, tested, and implemented. It will be shown how this method will increase the security level and the throughput of the data cryptography process. The proposed method will use a secret image_key to generate necessary private keys for each byte of the data block. The proposed method will be compared with other standard methods of data cryptography to show how it will meet the requirements of excellent cryptography, by achieving the objectives: Confidentiality, Integrity, Non-repudiation, and Authentication.
Article
Full-text available
Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.
Article
Full-text available
Speech files are now widely circulated using various means of communication, and sometimes the speech file can be secret, which requires protecting it from any unauthorized person to hear and understand it. The methods which use DES standard for data encryption-decryption are considered ineffective because they need a long time to implement the protection of speech files due to their large size and containing double data with fractions. In this paper research a method which uses WPT decomposition will be proposed, tested and implemented. It will be shown how the new introduced method will increase the cryptography process efficiency by minimizing the encryption-decryption times keeping at the same time excellent values for quality parameters.
Article
Full-text available
Digital color images are very important types of digital data, due to the large number of vital applications they need. To increase the efficiency of any image-based application we have to represent the image by a small size image features vector. In this paper WPT method of data decomposition will be studied and analyzed. A segmented method will be proposed and used based on WPT method. It will be shown how to enhance WPT method to be used as good method of features extraction and how this method will meet the requirements needed to generate color image features.
Article
Full-text available
Data compression is a process of reducing the data size to minimize the storage size and the data transmission time, will decompression means recovering the original data without losing any piece of information. In this research paper we will introduce an efficient method of data compression-decompression, this method will based on using FIR filter coefficients and linear prediction coding, the method will be tested and implemented to show how this method will increase the compression ratio and how to speed up the process of compression-decompression by comparing the obtained experimental results with the results of other existing methods.
Article
Full-text available
K means method and LBP based methods are commonly used for manipulating digital wave files, and they can be used for wave file features extraction, these features can be used later on as a wave file key or signature which refers to the wave file in any application, such as voice recognition or voice retrieval applications. K means method can be used to extract voice features, these features can be represented by clusters points, or within_cluster sums, or by the clusters centroids, and in this paper we will investigate the both methods in order to do some recommendations regarding the efficient method of voice features extraction.
Article
Full-text available
Digital audio is one of the most important types of data at present. It is used in several applications, such as human knowledge and many security and banking applications. A digital voice signal is usually of a large size where the acoustic signal consists of a set of values distributed in one column (one channel) (mono signal) or distributed in two columns (two channels) (stereo signal), these values usually are the results of sampling and quantization of the original analogue voice signal. In this paper we will introduce a method which can be used to create a signature or key, which can be used later to identify or recognize the wave file. The proposed method will be implemented and tested to show the accuracy and flexibility of this method.