Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Sawsan Hadi
Total Records ( 3 ) for Sawsan Hadi
  Baheja Shukur , Intissar hamid and Sawsan Hadi
  With the fast growth in multimedia and network technologies, the image compression and encryption become a very important part in the communication and storage of images. Image compression methods proposed by the authors have no concern of security. Similarly, image encryption methods proposed by the researchers have no concern of image size. This research presents a way to apply image encryption with compression using a secret key. In compression stage, Five Modulus Method (FMM) and FMM protocol apply to each band of image (R, G, B). The encryption stage consists of two-part diffusion and confusion operations. In diffusion part on all the bits of pixels in the image a sequential XOR operation is done and confusion part makes a circular rotate right of these bits. On the other hand, the suggested system uses geffe generator to generate an initial secret key. To evaluate our suggested system number of performance measurements are used like entropy, correlation, histogram, PSNR, MSE, AD, SC, MD, NAE and compression ratio to show the power of the suggested system. The suggested system is implemented in Vb6 language.
  Baheja K. Shukur , Zaid Rajih Mohammed and Sawsan Hadi
  Steganography is the process for hiding information into cover media. Many of techniques have been used for performing this process on electronic data, particularly audio and image data. Also, cryptography is considered as one of the most valuable and complicated areas in computer science. The need for cryptographic techniques in software used by the general public has increased with the domination of the internet due to the requirements to transmit secret information on a public network that facilitates information intercept and eavesdropping on its communications. Encryption can be defined as the procedure of altering the contents of text (data) into symbols and figures that are hard to interpret. The coding procedure is done with the use of many mathematic algorithms. In this study which deepened on two an effective and secure methods to encryption and hide information in color image. The suggest encryption method depend on the multi-level index and the generation of the content of the table randomly based on the generated equation ,in addition to that the range of the table take the range between 0-255 in both direction. This method is used to encryption any file for any extension. Moreover, to increase the production for this secure files concealing them in image. Applying an effective equation for hiding the secure file in random image position by making special calculating. To evaluate an encryption method number of evaluator measurement used between the original and encrypted file such as histogram, correlation and entropy. Also, we used PSNR, SSIM and NCC measurements to show the robustness for the steganography method. The system showing the good results in each method.
  Bahigah Khudair , Zainab Abdullah and Sawsan Hadi
  Image encryption is a very effective method used in information security. In this study, a new and secure method for image encryption is proposed. This method is implemented firstly by doing a circular rotation (right and left) operation on all pixels of the image; each row in the image is rotated number of times depending on number of row. Secondly, making a sequential XOR operation between the pixels in the image and secret key. During the encryption phase, the two operations are repeated several times. On the other hand, the proposed system uses hybrid generator to generate initial secret key. The hybrid generator is based on the combination of Pless and Groth generators algorithms to increase the complexity on attackers which improves the security In order to evaluate the security and performance of the proposed system, the recorded results from applying it on images are analyzed using statistical analysis, key space analysis and key sensitivity analysis. According to experimental results, the proposed method has the best performance with lower MSE, higher PSNR, higher entropy and the correlation was significantly decreased. Also the results showed that the method is sensitive to any changes in the secret key. The proposed system is implemented in Vb6 programming language.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility