SlideShare a Scribd company logo
TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 20, No. 4, August 2022, pp. 858~866
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.23367  858
Journal homepage: http://telkomnika.uad.ac.id
A proposed model for text and image encryption using different
techniques
Shihab A. Shawkat1
, Israa Al-Barazanchi2,3
1
Department of Quality Assurance and Academic Performance, University of Samarra, Samarra, Iraq
2
Baghdad College of Economic Sciences University, Baghdad, Iraq
3
College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN), Selangor, Malaysia
Article Info ABSTRACT
Article history:
Received Feb 15, 2022
Revised Jun 20, 2022
Accepted Jun 28, 2022
Data security and protection is one of the most common technologies used in
the field of computer science. This is because of its great importance in all
fields related to daily life, whether political, economic, and other aspects
change. In this research paper, a new intelligent system that concentrates on
image and text encryption and decryption is proposed. Furthermore, the
image recognition rate is increased. In this paper, the Rivest Shamir
Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt
and decrypt text. The proposed technique relies on using square root of
public key as private key. XOR operation for colored images encryption and
decryption is performed. By calculating signal to noise ratio (PSNR), mean
square error (MSE), and bit error rate (BER), the most important things that
we address how to provide data security for large data based on encryption
techniques and increase the security of multimedia data and texture date and
address the problem of time and accuracy in image matching. the results
show that the quality of images after decryption is good.
Keywords:
DCT techniques fourth
Information security second
Encryption
MSE
PSNR
RSA3k
XOR This is an open access article under the CC BY-SA license.
Corresponding Author:
Shihab A. Shawkat
Department of Quality Assurance and Academic Performance, University of Samarra
Samarra, Iraq
Email: shahab84ahmed@gmail.com
1. INTRODUCTION
The data security is one of the most important challenges facing the human since different eras
because of their relationship and close to a lot of important things in the life of rights, such as the security of
nations, preserving the lives of people from terrorist attacks, as a significant impact on trading, economic [1].
Therefore, there’re interested researchers in this area and especially after the increase in piracy and spy on
information, where many of the academic research conducted in this area operations. The difficulty of
finding a complete definition or full definition of artificial intelligence but not defined in the following that it
is the study of ideas in a way that enables the computer to deal in a smart [2], [3]. Data encryption is a way of
protecting the data that’s based on artificial intelligence. The encryption is necessary in the internet
applications of the image as it is the use of encryption to protect the images or data in transit across networks
such as (network internet and mobile phones and wireless communication systems and Bluetooth devices) [4].
Because of its ability to compressed steam, the discrete cosine transform (DCT) technique is considered one
of the most common techniques used in a wide variety of image detection and advanced forecasting
applications. In some variables, it condenses most of the data transmission [5]. The sparse representation
(SR) being a powerful and very important tool for acquiring and compressing high-dimensional signals, and
this success for the sparse representation originally due to the fact the important categories of brands such as
images and sound [6]. Rivest Shamir Adleman (RSA) encryption algorithm is the way of the use of certain
TELKOMNIKA Telecommun Comput El Control 
A proposed model for text and image encryption using different techniques (Shihab A. Shawkat)
859
keys where the information is encrypted in a manner that is understandable when viewed by unauthorized
people to look at it when they penetrate the system [7]. This paper introduces a new technique that uses the
combination of sparse and DCT to enhance recognition rate. It also proves that XOR operation can be used
on colored image encrypt and decryption and show the use of RSA 3 key (RSA3k) algorithm on text
encryption and decryption based on square root operation. Section 2 outlines prior work for
encryption/decryption algorithms, section 3 presents the proposed method, section 4 the output and
evaluation, section 5 the experimental findings, and section 6 the conclusion and potential research.
2. PREVIOUS WORKS
Most previous works of the have hidden a particular text or image based on chaotic systems to
generate random chains determine the map of the spread of secret data was used. Facial detection using
separate covariance translate pouch (DCT) detects global and regional forms on the anterior margin of a face
images, according to Rezende [8]. Is cropped facial image obtained from the user that is extracted facial image
in front of me only, it is divided based on pixel images. Sookhak et al. [9] provided an approach in conjunction
with RSA algorithms and digital signature. They merged a unique ability to control technology-based access
with authentication to mutual basis data security and efficiency in cloud computing. Nag et al. [10] adopted a
hybrid cryptography method that encrypts the image processor that use the reverse process after rearranging
the pixel values to use the invariant transformation. They use an invariant switch up with four 8-bit keys that
reallocate the pixel to various locations. The factors external then is divided into 2 pixels by 2-pixel frames,
with each region being encoded with four 8-bit keys using reverse process. The technique requires a 64-bit
total key size. The association between adjacent pixels was drastically decreased after the affine transform,
according to their findings. Thabit et al. [11] proposed methodology included various clouds that will be
available for use by the user. But before using cloud computing service user to register, during user
registration you will need to choose the encryption algorithm and then the user enters the security key to be
used to encrypt the data for this user only. After the end user registration process will get to know different
keys that can be used to encrypt/decrypt the data that the user will be stored via cloud. Kumari et al. [12]
provided a symmetric key image encryption technique based on the first step to change locations every pixel
in the image using a bit sub-key 4 and 8 then the coding pixel values by XOR and identification keys 8-bit
where XOR process that change the values of each pixel has been tested on various gray scale images
256×256 showed the results well. Seyedzade et al. [13] suggested a new encryption technique centered on the
SHA-512 hash function. The algorithm is split into two categories: the first performs a data pre-processing
process to move half of the picture. The hash value is used in the first to create a randomization block.
The masks then are XORed with the picture’s other portion, which will be coded. Waschke [14] provide
mythology for address the development of design for data encryption as well as we unzip encrypted in a
network environment using the RSA algorithm with a given type size. The algorithm allows the sender of a
message to employ staple keys to encrypt the message and the recipient is sent a special key that was created
using a data base reserved. Key special incorrect still will decode the encrypted message, but in a different
way from the original message. Otaibi and Gutub [15] proposed safe image data using a combination of
several encryption techniques and permutations, they purposed of their work present security in the pictures,
which is the main purposed of the system data increase. The images file encryption and decryption data
encryption done in such a way that makes it convenient for users. Barazanchi et al. [16] looks at the
fundamentals of cryptography and reflects on the evolution of RSA and increasing the sophistication of the
secret system to create a more secure in programs. We will focus on the Hash function in this venture by
introducing certain flexibility to the 3keys (3k) This implementation would improve the application’s safety
and sophistication while keeping the encryption and authentication times the same. The study also outlines
how cryptography can be used to improve cryptography. Furthermore, the RSA method generates dual
protection.
3. THE PROPOSED METHOD
3.1. Image encryption and decryption
3.1.1. DCT and SR
DCT this method is useful in a variety of fields, including physics and technology, as well as
extraction of features. Since it is a reliable and versatile face detection technology that uses some apply
statistical, it is commonly used in jpeg. Scientists in the disciplines of image recognition, machine learning,
neural networks, and problem solving have been drawn to dimension reduction (SR). It also has a clear track
record in both theoretical and practical studies [17], [18]. The following equation defines the general
equation for a 2D (𝑁 by 𝑀 image) DCT.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866
860
𝐹(𝑢, 𝑣) = (
2
𝑁
)
1
2
(
2
𝑀
)
1
2
∑  
𝑁−1𝑀−1
𝑖=0 Λ𝑗=0
𝑀
Λ(𝑖). Λ(𝑗) ⋅ cos [
𝜋⋅𝑢
2⋅𝑁
(2𝑖 + 1)] cos [
𝜋⋅𝑣
2⋅𝑀
(2𝑗 + 1)] ⋅ 𝑓(𝑖, 𝑗}} (1)
The DCT function in row 𝑘1 and column 𝑘2 of the cotter is 𝐹 (𝑢, 𝑣). 𝐹 (𝑖, 𝑗) is the device’s strength
in row 𝐼 and column 𝑗; in most pictures, the control output is concentrated at lower energies, which appear
inside the DCT’s upper left corner. Because the lower right caught up different speeds, analysis is done
because they are mostly small - small enough to still be ignored with no apparent noise. The following
equation for a signal’s local features (SR) in an overcomplete vocabulary. The question of local features is to
find a 𝑀1 vector vector x such that 𝑦 = 𝐴𝑥 and ||𝑥||0 is minimized [19], i.e. given a 𝑁 𝑀 matrix 𝐴
comprising the items of an over full vocabulary in its rows, with 𝑀 > 𝑁 and typically 𝑀 >> 𝑁, and a signal
𝑦 RN.
𝑥 = 𝑚𝑖𝑛 ∥ 𝑥′ ∥ 0 𝑠. 𝑡. 𝑦 = 𝐴𝑥 ∥ (2)
Where ||𝑥||0 is the ℓ0 norm and is equivalent to the number of non-zero components in the vector 𝑥.
3.1.2. XOR operation
There are many logical functions used for encryption technique like “not”, “and”, and “or”. These
logical functions sometimes used in stream cipher, so it’s offered a solid security in web browser area when
it’s connected to some server. The logical operation considered the basic for the one-time pad. When the
cipher is not suitable, the protection is eroded [20]. Image encryption and decryption the detail process of
image encryption and decryption. A new combination of the two main processes of our system are (DCT and
sparse representation, XOR operation) representation was proposed in this paper to improve the recognition
rate and database searching time and loading time, is shown in the block diagram given in Figure 1.
Figure 1. Detailed representation of the proposed scheme of image (encryption and decryption)
In this proposed begin the upload a video, after starting the video, the application uses only sparse
representation algorithm to make authentication and recognition and return the time taken in the database
searching and loading. The same process is made but using our proposed combination of DCT and sparse
algorithms. Then is supposed to where the photo that would be encrypted by using XOR operation. The XOR
operation are used to encrypt and decrypt color images, also peak signal-to-noise ratio (PSNR) are used to
show the difference between two images, and the mean squared error (MSE) to extract the rate error and bit
error rate (BER).
TELKOMNIKA Telecommun Comput El Control 
A proposed model for text and image encryption using different techniques (Shihab A. Shawkat)
861
3.2. Text encryption and decryption by RSA3k
The Massachusetts Institute of Technology (MIT) colleagues created RSA as the public-key
cryptography and unsymmetrical cypher as the source. For its credibility and detailed investigation, RSA was
chosen. Since it is industrial, a block chain model is generally marketed and used in the consumer and corporate
interaction sectors. The flexibility of RSA’s main size set, which ranges from 2 to 2048 bits, has made it more
useful in popular advances. The data lengths preferred by the developer or user determines the application’s
protection. With this method, a key with such a duration of 1024 bits is being used. Even though 512-bit keys
are still often used in apps [21], [22]. Public cryptographic authentication is a term used to describe the
authentication of a private key pair. In this group of formulas, a single key is often used to ‘encrypt’ and
‘decipher’ the texts. Because of key, every correspondence between complex parties will be kept private.
Each orator ought to have a secret identifier to ensure the highest level of protection. As a result, both
reporters must ensure that the user key is kept secret [23]. The main generation is the first step in RSA
simulations. Furthermore, each user must generate a set of keys [24]. The Hash function can be used for both
digital certificates and public key, making it more difficult for those attempting to decode information. RSA
employs traditional kinetic arithmetic when working to numbers that have thousands of digits. The following
steps generate a transport layer security (TLS) private and common button. Two of the prime numbers are
chosen including 𝑝, 𝑞 and 𝑟. Modulus by sub 2 can be calculated using these numbers such as 𝑛 = 𝑝 × 𝑞 × 2.
a) As the common integer, the third integer 𝑒 is chosen, that can multiply evenly. It is highly relevant to
the (𝑝 – 1), (𝑞 – 1), and (𝑟 – 1) products.
b) The number 𝑑 is a personal integer that can be derived from the coefficient
(𝑒𝑑−1)
(𝑝−1)(𝑞−1)(𝑟−1)
.
c) The keys 𝑛 and 𝑒 are a number set. Also, when 𝑞 and 𝑝 are large numbers, these measures are
ineffective for determining 𝑑 from 𝑒 and 𝑛.
d) For the encryption algorithm 𝑀, the cypher text 𝐶 is generated using a digital signature. 𝐶 = 𝑀𝑒 𝑀𝑜𝑑 𝑛
is used for this.
e) The recipient decrypts the required cypher text using the secret key and 𝑀 = 𝐶𝑑 𝑀𝑜𝑑 𝑛.
The frame diagram is shown in Figure 2 depicts the detailed method of text encryption and
decryption. After the encryption point, this block diagram starts. Our system’s key encryption method is
RSA3k, as seen in the diagram.
Figure 2. Detailed representation of the proposed scheme of text (encryption and decryption)
After authentication, the user would have two systems a system that makes encryption and
decryption for the authenticated image of person and a system that makes encryption and decryption for text.
If the user chooses to use the text encryption system. After the encryption process using RSA3k is complete a
time of encryption and uploading is computed, and the cipher text is shown to the user using Matlab. Then after
that, the asked to enter the private password and when the decryption process using RSA3k is finished a new
window is shown to the user using Matlab.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866
862
4. THE PERFORMANCE AND EVALUATION
In this section explain the performance and evaluation, the most important things that we address how
to provide data security for large data based on encryption techniques and increase the security of multimedia
data and texture date and address the problem of time and accuracy in image matching. The results show that
the quality of images after decryption is good. The proposed technique implemented using Matlab R2017a
software running on a personal computer with a 2.27 GHz Intel (R) Core (TM) i5 CPU, 8 GB RAM and
Windows 10 as the operating system. The obtained results and calculated data were evaluated using four:
(PSNR, MSE, BER, and recognition rate) statistical parametes as described [25], [26].
4.1. PSNR
PSNR refers to the accuracy of the secret text in compared to the traditional image. It measures the
encrypted picture’s perceptual quality. To put it another way, it measures and analyses how close two figures
are. The greater the PSNR of an encrypted picture, the higher the efficiency of the encrypted picture or the
greater the robustness of the cipher text. The PSNR is determined by using the calculation:
𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10 [
𝐼2
𝑀𝑆𝐸
] (3)
Where 𝐼 is the largest achievable value of a pixel in the image (for example, the peak amount for a gray
image is 255) and MSE seems to be the sum of squares.
4.2. MSE
The degree of average value between both the main image and the encrypted image is calculated
using the MSE function. The discrepancy between both the predicted data of the initial and encrypted images
is rounded, and the mean is then measured. When there are a lot of bugs, the RMSE is used. This is due to the
fact that it gives these mistakes a bunch of fat. The MSE is calculated as:
MSE=
1
[R×C]2
∑𝑛
𝑖=0 ∑ (Xij
Yij)2
m
j=1
(4)
𝑋𝑖𝑗 is the strength of 𝑋𝑖𝑗 the pixel in the cover picture, and 𝑌𝑖𝑗 seems to be the strength of 𝑌𝑖𝑗 the pixel in the
steganographic, where 𝑅 and 𝐶 are the number of rows or columns in the cover picture, 𝑋𝑖𝑗 is the strength of
𝑋𝑖𝑗 the pixel in the cover photo, and 𝑌𝑖𝑗 is the frequency of 𝑌𝑖𝑗 the segment in the steganography, respectively.
4.3. BER
The quantity obtained in error divided by the number of bits transmitted is known as the data rate
(BER). The BER can be calculated by measuring the likelihood of a bit being provided wrongly leading
towards sound. The BER is a straightforward term with a straightforward description and calculation.
𝐵𝐸𝑅 = 𝐸𝑟𝑟𝑜𝑟𝑠/𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐵𝑖𝑡𝑠 (5)
4.4. Recognition rate
Is the assessment tool the benchmark by which any facial recognition program’s output and success
are measured? criteria for evaluating output aim to differentiate, contrast, and analyze a host of variables such
as brand depends, position, light, and photographs, as well as how to adjust current performance standards
widely used in profile. The Identification Rate is determined as shown in the diagram following.
𝑅𝑒𝑐𝑜𝑔𝑛𝑖𝑡𝑖𝑜𝑛 𝑅𝑎𝑡𝑒 = (𝑛𝑜. 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑖𝑚𝑎𝑔𝑒𝑠/𝑡𝑜𝑡𝑎𝑙 𝑛𝑜. 𝑜𝑓 𝑖𝑚𝑎𝑔𝑒𝑠) × 100 (6)
5. EXPERIMENTAL RESULTS
The comparison between a combination of a sparse representation algorithm and DCT and sparse
representation algorithm alone using database. A make a comparison between recognition rate and database
loading and searching time between two different algorithms. The result will show that combination provide
better recognition rate, the user database description consists of: (total number of images: 100, number of
images per person: 4, total number of persons: 25).
5.1. Database loading and searching time
In this section will explaining the database loading and searching time, a make a comparison
between recognition rate and database loading and searching time between two different algorithms and show
how database loading time compression with the result that will show that combination provide better
TELKOMNIKA Telecommun Comput El Control 
A proposed model for text and image encryption using different techniques (Shihab A. Shawkat)
863
recognition rate. The following Table 1 illustrates the difference between combination of DCT and SR, and
SR alone in database loading time. Which will be in the form of database loads from (block 8×8) to (block
128×128) and that have been worked on successively and the results will show the difference between these
loads.
The difference between the combination of DCT and SR, SR alone in database searching time are
shown in following Table 2. Which will be in the form of database loads from (block 8×8) to (block
128×128) and that have been worked on successively and the results will show the difference between these
loads. It shows that DCT and SR, SR combination decrease database searching time.
Table 1. Database loading time compression
No. The blocks Combination of DCT and SR time load/sec SR time load/sec The difference
1 Block 8×8 2.05973 2.18563 0.12556
2 Block 16×16 2.01381 2.22272 0.20882
3 Block 32×32 2.04644 2.18652 0.14011
4 Block 64×64 2.07657 2.21265 0.13610
5 Block 128×128 2.09879 2.26488 0.11406
Table 2. Database searching time
No. The blocks Combination of DCT and SR searching time/sec SR searching time/sec The difference
1 Block 8×8 0.014081 0.094779 0.080711
2 Block 16×16 0.019696 0.079808 0.060119
3 Block 32×32 0.017018 0.101817 0.084812
4 Block 64×64 0.028011 0.110178 0.082171
5 Block 128×128 0.037005 0.131142 0.081044
5.2. Average of recognition rate
In this section will explaining the average of recognition rate, a make a comparison between
recognition rate and database loading and searching time between two different algorithms and show the
average of recognition rate comparison (result of 100 images). In Table 3 the average of recognition rate
when using (100 images) in the database from (block 8×8) to (block 128×128) using DCT and SR
combination is 95.76% while the average of SR only is 92.5%. Used the equation which represent the
recognition rate for the faces in the image.
Table 3. Average of recognition rate comparison (result of 100 images)
Average of recognition rate
The blocks
No.
SR
DCT and SR
94.6%
98.5%
Block 8×8
1
93.2%
97.2%
Block 16×16
2
92.8%
95.5%
Block 32×32
3
91.3%
94.1%
Block 64×64
4
90.6%
93.5%
Block 128×128
5
92.5%
95.76%
Average
6
5.3. Comparing the results against another approaches
In this section will explaining comparing the results against another approaches, a make a
comparison between recognition rate and database loading and searching time between two different
algorithms and show the comparison with the previous works. To test the effectiveness of the proposed
algorithm, the following performance criteria are used: accuracy, time/sec. Table 4 shows the proposed
algorithm results comparison between with the previous works in general, as show in Table 4. The database
loading has been and as a result the searching time has been reduced moreover, the recognition rate has been
increased. In future work we will try to combine another algorithm with the presented system to improve the
results providing higher security and quality as compared to existing techniques.
Table 4. The comparison with the previous works
No. Model Accuracy Time/sec
1 Wang and Xu [27] Medium Medium
2 Dabbaghchian et al. [28] High Medium
3 Chadha et al. [29] Low High
4 Proposed Model High High
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866
864
5.4. Text and image encryption/decryption
After make encryption and decryption in our proposed system we evaluate by using (PSNR, MSE, and
BER) the result in this case shows the quality of image after decryption in proposed system is good. The make
more than 5 experiments in image encryption and decryption, in our proposed system, we use RSA3k algorithm
for text encryption and decryption. This algorithm requires 3 keys a public key and a private 2 key, a public key
is used only for encryption, and the private key is used only for decryption. Will show the results of two
experiments as show in Table 5.
Table 5. The experiments text and image encryption/decryption
No Images and evaluation
1 Image 1
PSNR 58.9694
MSE 0.0824
BER 0
Time
encrypt
0.085478
Time
decrypt
0.039626
2 Image 2
PSNR 65.5861
MSE 0.0180
BER 0
Time
encrypt
0.084077
Time
decrypt
0.021103
3 Image 3
PSNR 67.0376
MSE 0.0012
BER 0
Time
encrypt
0.026895
Time
decrypt
0.089263
4 Image 4
PSNR 68.4774
MSE 0.0092
BER 0
Time
encrypt
0.096635
Time
decrypt
0.028295
5 Image 5
PSNR 75.2070
MSE 0.0020
BER 0
Time
encrypt
0.091629
Time
decrypt
0.024666
TELKOMNIKA Telecommun Comput El Control 
A proposed model for text and image encryption using different techniques (Shihab A. Shawkat)
865
6. CONCLUSION AND FUTURE WORK
In this paper, a novel image security technique is intelligent system to encrypt and decrypt images as
well as texts has been proposing; such system has combined two algorithms DCT and SR. In addition, using
the RSA3k algorithm the proposed system has been compared with SR algorithm. Simulation results have
proven that the proposed system performs better. The database loading has been and as a result the searching
time has been reduced moreover, the recognition rate has been increased. In future work we will try to
combine another algorithm with the presented system to improve the results providing higher security and
quality as compared to existing techniques.
REFERENCES
[1] S. Sicari, A. Rizzardi, L. A. Grieco, and A. C. -Porisini, “Security, privacy and trust in Internet of Things: The road ahead,”
Computer Networks, vol. 76, pp. 146–164, 2015, doi: 10.1016/j.comnet.2014.11.008.
[2] S. Abt and H. Baier, “Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research,” 2014
Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014,
pp. 40-55, doi: 10.1109/BADGERS.2014.11.
[3] S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Computer Networks, vol. 57, no. 2,
pp. 378–403, 2013, doi: 10.1016/j.comnet.2012.07.021.
[4] Ü. Çavuşoğlu, A. Akgül, S. Kaçar, İ. Pehli̇van, and A. Zengin, “A novel chaos‐based encryption algorithm over TCP data packet
for secure communication,” Security and Communication Networks, vol. 9, pp. 1285–1296, 2016, doi: 10.1002/sec.1414.
[5] R. Sudhakar, R. Karthiga, and S. Jayaraman, “Image compression using coding of wavelet coefficients–a survey,” ICGST-GVIP
Journal, vol. 5, no. 6, pp. 25–38, 2005. [Online]. Available: https://static.aminer.org/pdf/PDF/000/320/249/
adaptive_subband_image_coding_considering_spatial_relationship_on_hierarchical_pyramid.pdf
[6] F. Li, L. Xin, Y. Liu, J. Fu, Y. Liu, and Y. Guo, “High efficient optical remote sensing images acquisition for nano-satellite
framework,” Sensors, Systems, and Next-Generation Satellites XXI, 2017, doi: 10.1117/12.2278171.
[7] S. A. Shawkat, “Enhancing Steganography Techniques in Digital Images,” Thesis, Faculty of Computers and Information,
Mansoura University Egypt, 2016, doi: 10.13140/RG.2.2.16678.57925.
[8] M. V. Rezende, “Evaluation of Face Recognition Technologies for Access Authentication in Automotive Passive Entry Systems
with Near Infrared Camera,” Projetos e Dissertações em Sistemas de Informação e Gestão do Conhecimento, vol. 4, 2015.
[Online]. Available: https://www.semanticscholar.org/paper/Evaluation-of-Face-Recognition-Technologies-for-in-
Rezende/b051ffe615b55278eb9449cd6db543ce5fa3c288.
[9] M. Sookhak, F. R. Yu, M. K. Khan, Y. Xiang, and R. Buyya, “Attribute-based data access control in mobile cloud computing:
Taxonomy and open issues,” Future Generation Computer System, vol. 72, pp. 273–287, 2017, doi: 10.1016/j.future.2016.08.018.
[10] A. Nag et al., “Image encryption using affine transform and XOR operation,” 2011 International Conference on Signal
Processing, Communication, Computing and Networking Technologies, 2011, pp. 309-312, doi: 10.1109/ICSCCN.2011.6024565.
[11] F. Thabit, S. Alhomdy, A. H. A. Al-Ahdal, and S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security
in cloud computing,” Global Transitions Proceedings, 2021, vol. 2, no. 1, pp. 91–99. doi: 10.1016/j.gltp.2021.01.013.
[12] M. Kumari, S. Gupta, and P. Sardana, “A survey of image encryption algorithms,” 3D Research, vol. 8, no. 4, p. 37, 2017,
doi: 10.1007/s13319-017-0148-5.
[13] S. M. Seyedzade, S. Mirzakuchaki, and R. E. Atani, “A novel image encryption algorithm based on hash function,” 2010 6th
Iranian Conference on Machine Vision and Image Processing, 2010, pp. 1–6, doi: 10.1109/IranianMVIP.2010.5941167.
[14] M. Waschke, Personal cybersecurity: how to avoid and recover from cybercrime, Apress, 2017, doi: 10.1007/978-1-4842-2430-4.
[15] N. A. Al-Otaibi and A. A. Gutub, “2-leyer security system for hiding sensitive text data on personal computers,” Lecture Notes on
Information Theory, vol. 2, no. 2, pp. 151–157, 2014, doi: 10.12720/lnit.2.2.151-157.
[16] I. Al Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure
approach,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp. 2818–2825, 2019,
doi: 10.12928/telkomnika.v17i6.13201.
[17] J. Shermina, “Illumination invariant face recognition using Discrete Cosine Transform and Principal Component Analysis,” 2011
International Conference on Emerging Trends in Electrical and Computer Technology, 2011, pp. 826-830,
doi: 10.1109/ICETECT.2011.5760233.
[18] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A survey of deep neural network architectures and their
applications,” Neurocomputing, vol. 234, pp. 11–26, 2017, doi: 10.1016/j.neucom.2016.12.038.
[19] S. S. Hameed, H. R. Abdulshaheed, Z. L. Ali, and H. M. Gheni, “Implement DNN technology by using wireless sensor network
system based on IOT applications,” Periodicals of Engineering and Natural Sciences (PEN), vol. 10, no. 2, pp. 128-137, 2022,
doi: 10.21533/pen.v10i2.2831.
[20] D. Singh, I. Nath, and P. K. Singh, “Security and Privacy Challenges in Big Data,” Research Anthology on Privatizing and
Securing Data. IGI Global, 2021. doi: 10.4018/978-1-5225-9742-1.ch004.
[21] Y. Yu et al., “Cloud data integrity checking with an identity-based auditing mechanism from RSA,” Future Generation Computer
System, vol. 62, pp. 85–91, 2016, doi: 10.1016/j.future.2016.02.003.
[22] S. A. Shawkat and R. N. Ismail, “Biometric Technologies in Recognition Systems: A Survey,” Tikrit Journal of Pure Science,
vol. 24, no. 6, 2019, doi: 10.25130/j.v24i6.899.
[23] C. Thirumalai and H. Kar, “Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data
over cloud and IoT devices,” 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017, pp. 1-6,
doi: 10.1109/IPACT.2017.8244948.
[24] V. R. Pancholi and B. P. Patel, “Enhancement of cloud computing security with secure data storage using AES,” International
Journal for Innovative Research in Science and Technology, vol. 2, no. 9, pp. 18–21, 2016. [Online]. Available:
https://www.semanticscholar.org/paper/Enhancement-of-Cloud-Computing-Security-with-Secure-Pancholi-Patel/
71fad1cfde27b7df42e9b4579f9a623830893029
[25] M. Dalal and M. Juneja, “A secure and robust video steganography scheme for covert communication in H. 264/AVC,”
Multimedia Tools and Applications, vol. 80, no. 9, pp. 14383–14407, 2021, doi: 10.1007/s11042-020-10364-z.
[26] S. A. Shawkat, K. S. L. Al-badri, and A. I. Turki, “The new hand geometry system and automatic identification,” Periodicals of
Engineering and National Scince, vol. 7, no. 3, pp. 996–1008, 2019, doi: 10.21533/pen.v7i3.632.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866
866
[27] W. Wang and L. Xu, “A modified sparse representation method for facial expression recognition,” Computational Intelligence
and Neuroscience, vol. 2016, 2016, doi: 10.1155/2016/5687602.
[28] S. Dabbaghchian, M. P. Ghaemmaghami, and A. Aghagolzadeh, “Feature extraction using discrete cosine transform and
discrimination power analysis with a face recognition technology,” Pattern Recognition, vol. 43, no. 4, pp. 1431–1440, 2010,
doi: 10.1016/j.patcog.2009.11.001.
[29] A. R. Chadha, P. P. Vaidya, and M. M. Roja, “Face recognition using discrete cosine transform for global and local features,” in
2011 International Conference On Recent Advancements In Electrical, Electronics And Control Engineering, 2011, pp. 502–505.
doi: 10.1109/Iconraeece.2011.6129742.
BIOGRAPHIES OF AUTHORS
Shihab A. Shawkat received the B.Sc. degree in Computer Science from
University of Tikrit in 2007 and M.Sc. Degree in Computer Science from Mansoura
University in 2017. Mr. Shihab A. Shawkat worked as a teacher during the period from 2008
to 2019 in Directorate of Education in Salah Al-Din, Ministry of Education, Iraq. He has
recently started working at the University of Samarra at the end of 2019 till now. His research
interest lies in Computer Science, Information Security, image processing and AI. He can be
contacted at email: shahab84ahmed@gmail.com.
Israa Al-Barazanchi received her Bachelor of Computer Science (BCS) from
Department of Computer Science, Baghdad college of economic science university-Iraq-
Baghdad in June 2002. In January 2010, she entered the master’s program at the Faculty of
Information and Communication Technology, Graduate School of Computer Science
(Internetworking Technology), Universiti Teknikal Malaysia. She is Currently a student
Doctor of Philosophy in Information and Communication Technology. She is a lecturer in
Computer Engineering Techniques Department. Editor-in-chief for international union of
universities journal. Member of Editor board in many Scopus journals for computer science
field. Head of Researcher group. Member in many conferences panel and communications
events. She is a Reviewer of various high impact factor journals. Her research activities are:
WBAN, WSN, WiMAX, WiFi on Vehicular Ad-Hoc Networks (VANETs), Communications,
Networking, Signal Processing, IOT, Smart Systems, Blockchain. She can be contacted at
email: israa.albarazanchi@baghdadcollege.edu.iq and israa44444@gmail.com.

More Related Content

PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
PDF
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
PDF
Ijcnc050208
IJCNCJournal
 
PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
PDF
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
PDF
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
Ijcnc050208
IJCNCJournal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 

Similar to 18. 23367.pdf (20)

DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
PDF
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
PDF
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
PDF
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
 
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
PDF
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
PDF
Mj3422172221
IJERA Editor
 
PDF
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
PDF
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
PDF
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
PDF
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IJECEIAES
 
PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
PDF
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd Iaetsd
 
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
Dual method cryptography image by two force secure and steganography secret m...
TELKOMNIKA JOURNAL
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
Mj3422172221
IJERA Editor
 
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
IJECEIAES
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd Iaetsd
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 

More from TELKOMNIKA JOURNAL (20)

PDF
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
TELKOMNIKA JOURNAL
 
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
TELKOMNIKA JOURNAL
 
PDF
Indonesian continuous speech recognition optimization with convolution bidir...
TELKOMNIKA JOURNAL
 
PDF
Recognition and understanding of construction safety signs by final year engi...
TELKOMNIKA JOURNAL
 
PDF
The use of dolomite to overcome grounding resistance in acidic swamp land
TELKOMNIKA JOURNAL
 
PDF
Clustering of swamp land types against soil resistivity and grounding resistance
TELKOMNIKA JOURNAL
 
PDF
Hybrid methodology for parameter algebraic identification in spatial/time dom...
TELKOMNIKA JOURNAL
 
PDF
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
TELKOMNIKA JOURNAL
 
PDF
Deep learning approaches for accurate wood species recognition
TELKOMNIKA JOURNAL
 
PDF
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
TELKOMNIKA JOURNAL
 
PDF
Reversible data hiding with selective bits difference expansion and modulus f...
TELKOMNIKA JOURNAL
 
PDF
Website-based: smart goat farm monitoring cages
TELKOMNIKA JOURNAL
 
PDF
Novel internet of things-spectroscopy methods for targeted water pollutants i...
TELKOMNIKA JOURNAL
 
PDF
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
TELKOMNIKA JOURNAL
 
PDF
Convolutional neural network-based real-time drowsy driver detection for acci...
TELKOMNIKA JOURNAL
 
PDF
Addressing overfitting in comparative study for deep learningbased classifica...
TELKOMNIKA JOURNAL
 
PDF
Integrating artificial intelligence into accounting systems: a qualitative st...
TELKOMNIKA JOURNAL
 
PDF
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
TELKOMNIKA JOURNAL
 
PDF
Adulterated beef detection with redundant gas sensor using optimized convolut...
TELKOMNIKA JOURNAL
 
PDF
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
TELKOMNIKA JOURNAL
 
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
TELKOMNIKA JOURNAL
 
Implementation of ICMP flood detection and mitigation system based on softwar...
TELKOMNIKA JOURNAL
 
Indonesian continuous speech recognition optimization with convolution bidir...
TELKOMNIKA JOURNAL
 
Recognition and understanding of construction safety signs by final year engi...
TELKOMNIKA JOURNAL
 
The use of dolomite to overcome grounding resistance in acidic swamp land
TELKOMNIKA JOURNAL
 
Clustering of swamp land types against soil resistivity and grounding resistance
TELKOMNIKA JOURNAL
 
Hybrid methodology for parameter algebraic identification in spatial/time dom...
TELKOMNIKA JOURNAL
 
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
TELKOMNIKA JOURNAL
 
Deep learning approaches for accurate wood species recognition
TELKOMNIKA JOURNAL
 
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
TELKOMNIKA JOURNAL
 
Reversible data hiding with selective bits difference expansion and modulus f...
TELKOMNIKA JOURNAL
 
Website-based: smart goat farm monitoring cages
TELKOMNIKA JOURNAL
 
Novel internet of things-spectroscopy methods for targeted water pollutants i...
TELKOMNIKA JOURNAL
 
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
TELKOMNIKA JOURNAL
 
Convolutional neural network-based real-time drowsy driver detection for acci...
TELKOMNIKA JOURNAL
 
Addressing overfitting in comparative study for deep learningbased classifica...
TELKOMNIKA JOURNAL
 
Integrating artificial intelligence into accounting systems: a qualitative st...
TELKOMNIKA JOURNAL
 
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
TELKOMNIKA JOURNAL
 
Adulterated beef detection with redundant gas sensor using optimized convolut...
TELKOMNIKA JOURNAL
 
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
TELKOMNIKA JOURNAL
 

Recently uploaded (20)

PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 

18. 23367.pdf

  • 1. TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 20, No. 4, August 2022, pp. 858~866 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.23367  858 Journal homepage: http://telkomnika.uad.ac.id A proposed model for text and image encryption using different techniques Shihab A. Shawkat1 , Israa Al-Barazanchi2,3 1 Department of Quality Assurance and Academic Performance, University of Samarra, Samarra, Iraq 2 Baghdad College of Economic Sciences University, Baghdad, Iraq 3 College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN), Selangor, Malaysia Article Info ABSTRACT Article history: Received Feb 15, 2022 Revised Jun 20, 2022 Accepted Jun 28, 2022 Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good. Keywords: DCT techniques fourth Information security second Encryption MSE PSNR RSA3k XOR This is an open access article under the CC BY-SA license. Corresponding Author: Shihab A. Shawkat Department of Quality Assurance and Academic Performance, University of Samarra Samarra, Iraq Email: [email protected] 1. INTRODUCTION The data security is one of the most important challenges facing the human since different eras because of their relationship and close to a lot of important things in the life of rights, such as the security of nations, preserving the lives of people from terrorist attacks, as a significant impact on trading, economic [1]. Therefore, there’re interested researchers in this area and especially after the increase in piracy and spy on information, where many of the academic research conducted in this area operations. The difficulty of finding a complete definition or full definition of artificial intelligence but not defined in the following that it is the study of ideas in a way that enables the computer to deal in a smart [2], [3]. Data encryption is a way of protecting the data that’s based on artificial intelligence. The encryption is necessary in the internet applications of the image as it is the use of encryption to protect the images or data in transit across networks such as (network internet and mobile phones and wireless communication systems and Bluetooth devices) [4]. Because of its ability to compressed steam, the discrete cosine transform (DCT) technique is considered one of the most common techniques used in a wide variety of image detection and advanced forecasting applications. In some variables, it condenses most of the data transmission [5]. The sparse representation (SR) being a powerful and very important tool for acquiring and compressing high-dimensional signals, and this success for the sparse representation originally due to the fact the important categories of brands such as images and sound [6]. Rivest Shamir Adleman (RSA) encryption algorithm is the way of the use of certain
  • 2. TELKOMNIKA Telecommun Comput El Control  A proposed model for text and image encryption using different techniques (Shihab A. Shawkat) 859 keys where the information is encrypted in a manner that is understandable when viewed by unauthorized people to look at it when they penetrate the system [7]. This paper introduces a new technique that uses the combination of sparse and DCT to enhance recognition rate. It also proves that XOR operation can be used on colored image encrypt and decryption and show the use of RSA 3 key (RSA3k) algorithm on text encryption and decryption based on square root operation. Section 2 outlines prior work for encryption/decryption algorithms, section 3 presents the proposed method, section 4 the output and evaluation, section 5 the experimental findings, and section 6 the conclusion and potential research. 2. PREVIOUS WORKS Most previous works of the have hidden a particular text or image based on chaotic systems to generate random chains determine the map of the spread of secret data was used. Facial detection using separate covariance translate pouch (DCT) detects global and regional forms on the anterior margin of a face images, according to Rezende [8]. Is cropped facial image obtained from the user that is extracted facial image in front of me only, it is divided based on pixel images. Sookhak et al. [9] provided an approach in conjunction with RSA algorithms and digital signature. They merged a unique ability to control technology-based access with authentication to mutual basis data security and efficiency in cloud computing. Nag et al. [10] adopted a hybrid cryptography method that encrypts the image processor that use the reverse process after rearranging the pixel values to use the invariant transformation. They use an invariant switch up with four 8-bit keys that reallocate the pixel to various locations. The factors external then is divided into 2 pixels by 2-pixel frames, with each region being encoded with four 8-bit keys using reverse process. The technique requires a 64-bit total key size. The association between adjacent pixels was drastically decreased after the affine transform, according to their findings. Thabit et al. [11] proposed methodology included various clouds that will be available for use by the user. But before using cloud computing service user to register, during user registration you will need to choose the encryption algorithm and then the user enters the security key to be used to encrypt the data for this user only. After the end user registration process will get to know different keys that can be used to encrypt/decrypt the data that the user will be stored via cloud. Kumari et al. [12] provided a symmetric key image encryption technique based on the first step to change locations every pixel in the image using a bit sub-key 4 and 8 then the coding pixel values by XOR and identification keys 8-bit where XOR process that change the values of each pixel has been tested on various gray scale images 256×256 showed the results well. Seyedzade et al. [13] suggested a new encryption technique centered on the SHA-512 hash function. The algorithm is split into two categories: the first performs a data pre-processing process to move half of the picture. The hash value is used in the first to create a randomization block. The masks then are XORed with the picture’s other portion, which will be coded. Waschke [14] provide mythology for address the development of design for data encryption as well as we unzip encrypted in a network environment using the RSA algorithm with a given type size. The algorithm allows the sender of a message to employ staple keys to encrypt the message and the recipient is sent a special key that was created using a data base reserved. Key special incorrect still will decode the encrypted message, but in a different way from the original message. Otaibi and Gutub [15] proposed safe image data using a combination of several encryption techniques and permutations, they purposed of their work present security in the pictures, which is the main purposed of the system data increase. The images file encryption and decryption data encryption done in such a way that makes it convenient for users. Barazanchi et al. [16] looks at the fundamentals of cryptography and reflects on the evolution of RSA and increasing the sophistication of the secret system to create a more secure in programs. We will focus on the Hash function in this venture by introducing certain flexibility to the 3keys (3k) This implementation would improve the application’s safety and sophistication while keeping the encryption and authentication times the same. The study also outlines how cryptography can be used to improve cryptography. Furthermore, the RSA method generates dual protection. 3. THE PROPOSED METHOD 3.1. Image encryption and decryption 3.1.1. DCT and SR DCT this method is useful in a variety of fields, including physics and technology, as well as extraction of features. Since it is a reliable and versatile face detection technology that uses some apply statistical, it is commonly used in jpeg. Scientists in the disciplines of image recognition, machine learning, neural networks, and problem solving have been drawn to dimension reduction (SR). It also has a clear track record in both theoretical and practical studies [17], [18]. The following equation defines the general equation for a 2D (𝑁 by 𝑀 image) DCT.
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866 860 𝐹(𝑢, 𝑣) = ( 2 𝑁 ) 1 2 ( 2 𝑀 ) 1 2 ∑   𝑁−1𝑀−1 𝑖=0 Λ𝑗=0 𝑀 Λ(𝑖). Λ(𝑗) ⋅ cos [ 𝜋⋅𝑢 2⋅𝑁 (2𝑖 + 1)] cos [ 𝜋⋅𝑣 2⋅𝑀 (2𝑗 + 1)] ⋅ 𝑓(𝑖, 𝑗}} (1) The DCT function in row 𝑘1 and column 𝑘2 of the cotter is 𝐹 (𝑢, 𝑣). 𝐹 (𝑖, 𝑗) is the device’s strength in row 𝐼 and column 𝑗; in most pictures, the control output is concentrated at lower energies, which appear inside the DCT’s upper left corner. Because the lower right caught up different speeds, analysis is done because they are mostly small - small enough to still be ignored with no apparent noise. The following equation for a signal’s local features (SR) in an overcomplete vocabulary. The question of local features is to find a 𝑀1 vector vector x such that 𝑦 = 𝐴𝑥 and ||𝑥||0 is minimized [19], i.e. given a 𝑁 𝑀 matrix 𝐴 comprising the items of an over full vocabulary in its rows, with 𝑀 > 𝑁 and typically 𝑀 >> 𝑁, and a signal 𝑦 RN. 𝑥 = 𝑚𝑖𝑛 ∥ 𝑥′ ∥ 0 𝑠. 𝑡. 𝑦 = 𝐴𝑥 ∥ (2) Where ||𝑥||0 is the ℓ0 norm and is equivalent to the number of non-zero components in the vector 𝑥. 3.1.2. XOR operation There are many logical functions used for encryption technique like “not”, “and”, and “or”. These logical functions sometimes used in stream cipher, so it’s offered a solid security in web browser area when it’s connected to some server. The logical operation considered the basic for the one-time pad. When the cipher is not suitable, the protection is eroded [20]. Image encryption and decryption the detail process of image encryption and decryption. A new combination of the two main processes of our system are (DCT and sparse representation, XOR operation) representation was proposed in this paper to improve the recognition rate and database searching time and loading time, is shown in the block diagram given in Figure 1. Figure 1. Detailed representation of the proposed scheme of image (encryption and decryption) In this proposed begin the upload a video, after starting the video, the application uses only sparse representation algorithm to make authentication and recognition and return the time taken in the database searching and loading. The same process is made but using our proposed combination of DCT and sparse algorithms. Then is supposed to where the photo that would be encrypted by using XOR operation. The XOR operation are used to encrypt and decrypt color images, also peak signal-to-noise ratio (PSNR) are used to show the difference between two images, and the mean squared error (MSE) to extract the rate error and bit error rate (BER).
  • 4. TELKOMNIKA Telecommun Comput El Control  A proposed model for text and image encryption using different techniques (Shihab A. Shawkat) 861 3.2. Text encryption and decryption by RSA3k The Massachusetts Institute of Technology (MIT) colleagues created RSA as the public-key cryptography and unsymmetrical cypher as the source. For its credibility and detailed investigation, RSA was chosen. Since it is industrial, a block chain model is generally marketed and used in the consumer and corporate interaction sectors. The flexibility of RSA’s main size set, which ranges from 2 to 2048 bits, has made it more useful in popular advances. The data lengths preferred by the developer or user determines the application’s protection. With this method, a key with such a duration of 1024 bits is being used. Even though 512-bit keys are still often used in apps [21], [22]. Public cryptographic authentication is a term used to describe the authentication of a private key pair. In this group of formulas, a single key is often used to ‘encrypt’ and ‘decipher’ the texts. Because of key, every correspondence between complex parties will be kept private. Each orator ought to have a secret identifier to ensure the highest level of protection. As a result, both reporters must ensure that the user key is kept secret [23]. The main generation is the first step in RSA simulations. Furthermore, each user must generate a set of keys [24]. The Hash function can be used for both digital certificates and public key, making it more difficult for those attempting to decode information. RSA employs traditional kinetic arithmetic when working to numbers that have thousands of digits. The following steps generate a transport layer security (TLS) private and common button. Two of the prime numbers are chosen including 𝑝, 𝑞 and 𝑟. Modulus by sub 2 can be calculated using these numbers such as 𝑛 = 𝑝 × 𝑞 × 2. a) As the common integer, the third integer 𝑒 is chosen, that can multiply evenly. It is highly relevant to the (𝑝 – 1), (𝑞 – 1), and (𝑟 – 1) products. b) The number 𝑑 is a personal integer that can be derived from the coefficient (𝑒𝑑−1) (𝑝−1)(𝑞−1)(𝑟−1) . c) The keys 𝑛 and 𝑒 are a number set. Also, when 𝑞 and 𝑝 are large numbers, these measures are ineffective for determining 𝑑 from 𝑒 and 𝑛. d) For the encryption algorithm 𝑀, the cypher text 𝐶 is generated using a digital signature. 𝐶 = 𝑀𝑒 𝑀𝑜𝑑 𝑛 is used for this. e) The recipient decrypts the required cypher text using the secret key and 𝑀 = 𝐶𝑑 𝑀𝑜𝑑 𝑛. The frame diagram is shown in Figure 2 depicts the detailed method of text encryption and decryption. After the encryption point, this block diagram starts. Our system’s key encryption method is RSA3k, as seen in the diagram. Figure 2. Detailed representation of the proposed scheme of text (encryption and decryption) After authentication, the user would have two systems a system that makes encryption and decryption for the authenticated image of person and a system that makes encryption and decryption for text. If the user chooses to use the text encryption system. After the encryption process using RSA3k is complete a time of encryption and uploading is computed, and the cipher text is shown to the user using Matlab. Then after that, the asked to enter the private password and when the decryption process using RSA3k is finished a new window is shown to the user using Matlab.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866 862 4. THE PERFORMANCE AND EVALUATION In this section explain the performance and evaluation, the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. The results show that the quality of images after decryption is good. The proposed technique implemented using Matlab R2017a software running on a personal computer with a 2.27 GHz Intel (R) Core (TM) i5 CPU, 8 GB RAM and Windows 10 as the operating system. The obtained results and calculated data were evaluated using four: (PSNR, MSE, BER, and recognition rate) statistical parametes as described [25], [26]. 4.1. PSNR PSNR refers to the accuracy of the secret text in compared to the traditional image. It measures the encrypted picture’s perceptual quality. To put it another way, it measures and analyses how close two figures are. The greater the PSNR of an encrypted picture, the higher the efficiency of the encrypted picture or the greater the robustness of the cipher text. The PSNR is determined by using the calculation: 𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10 [ 𝐼2 𝑀𝑆𝐸 ] (3) Where 𝐼 is the largest achievable value of a pixel in the image (for example, the peak amount for a gray image is 255) and MSE seems to be the sum of squares. 4.2. MSE The degree of average value between both the main image and the encrypted image is calculated using the MSE function. The discrepancy between both the predicted data of the initial and encrypted images is rounded, and the mean is then measured. When there are a lot of bugs, the RMSE is used. This is due to the fact that it gives these mistakes a bunch of fat. The MSE is calculated as: MSE= 1 [R×C]2 ∑𝑛 𝑖=0 ∑ (Xij Yij)2 m j=1 (4) 𝑋𝑖𝑗 is the strength of 𝑋𝑖𝑗 the pixel in the cover picture, and 𝑌𝑖𝑗 seems to be the strength of 𝑌𝑖𝑗 the pixel in the steganographic, where 𝑅 and 𝐶 are the number of rows or columns in the cover picture, 𝑋𝑖𝑗 is the strength of 𝑋𝑖𝑗 the pixel in the cover photo, and 𝑌𝑖𝑗 is the frequency of 𝑌𝑖𝑗 the segment in the steganography, respectively. 4.3. BER The quantity obtained in error divided by the number of bits transmitted is known as the data rate (BER). The BER can be calculated by measuring the likelihood of a bit being provided wrongly leading towards sound. The BER is a straightforward term with a straightforward description and calculation. 𝐵𝐸𝑅 = 𝐸𝑟𝑟𝑜𝑟𝑠/𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐵𝑖𝑡𝑠 (5) 4.4. Recognition rate Is the assessment tool the benchmark by which any facial recognition program’s output and success are measured? criteria for evaluating output aim to differentiate, contrast, and analyze a host of variables such as brand depends, position, light, and photographs, as well as how to adjust current performance standards widely used in profile. The Identification Rate is determined as shown in the diagram following. 𝑅𝑒𝑐𝑜𝑔𝑛𝑖𝑡𝑖𝑜𝑛 𝑅𝑎𝑡𝑒 = (𝑛𝑜. 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑑 𝑖𝑚𝑎𝑔𝑒𝑠/𝑡𝑜𝑡𝑎𝑙 𝑛𝑜. 𝑜𝑓 𝑖𝑚𝑎𝑔𝑒𝑠) × 100 (6) 5. EXPERIMENTAL RESULTS The comparison between a combination of a sparse representation algorithm and DCT and sparse representation algorithm alone using database. A make a comparison between recognition rate and database loading and searching time between two different algorithms. The result will show that combination provide better recognition rate, the user database description consists of: (total number of images: 100, number of images per person: 4, total number of persons: 25). 5.1. Database loading and searching time In this section will explaining the database loading and searching time, a make a comparison between recognition rate and database loading and searching time between two different algorithms and show how database loading time compression with the result that will show that combination provide better
  • 6. TELKOMNIKA Telecommun Comput El Control  A proposed model for text and image encryption using different techniques (Shihab A. Shawkat) 863 recognition rate. The following Table 1 illustrates the difference between combination of DCT and SR, and SR alone in database loading time. Which will be in the form of database loads from (block 8×8) to (block 128×128) and that have been worked on successively and the results will show the difference between these loads. The difference between the combination of DCT and SR, SR alone in database searching time are shown in following Table 2. Which will be in the form of database loads from (block 8×8) to (block 128×128) and that have been worked on successively and the results will show the difference between these loads. It shows that DCT and SR, SR combination decrease database searching time. Table 1. Database loading time compression No. The blocks Combination of DCT and SR time load/sec SR time load/sec The difference 1 Block 8×8 2.05973 2.18563 0.12556 2 Block 16×16 2.01381 2.22272 0.20882 3 Block 32×32 2.04644 2.18652 0.14011 4 Block 64×64 2.07657 2.21265 0.13610 5 Block 128×128 2.09879 2.26488 0.11406 Table 2. Database searching time No. The blocks Combination of DCT and SR searching time/sec SR searching time/sec The difference 1 Block 8×8 0.014081 0.094779 0.080711 2 Block 16×16 0.019696 0.079808 0.060119 3 Block 32×32 0.017018 0.101817 0.084812 4 Block 64×64 0.028011 0.110178 0.082171 5 Block 128×128 0.037005 0.131142 0.081044 5.2. Average of recognition rate In this section will explaining the average of recognition rate, a make a comparison between recognition rate and database loading and searching time between two different algorithms and show the average of recognition rate comparison (result of 100 images). In Table 3 the average of recognition rate when using (100 images) in the database from (block 8×8) to (block 128×128) using DCT and SR combination is 95.76% while the average of SR only is 92.5%. Used the equation which represent the recognition rate for the faces in the image. Table 3. Average of recognition rate comparison (result of 100 images) Average of recognition rate The blocks No. SR DCT and SR 94.6% 98.5% Block 8×8 1 93.2% 97.2% Block 16×16 2 92.8% 95.5% Block 32×32 3 91.3% 94.1% Block 64×64 4 90.6% 93.5% Block 128×128 5 92.5% 95.76% Average 6 5.3. Comparing the results against another approaches In this section will explaining comparing the results against another approaches, a make a comparison between recognition rate and database loading and searching time between two different algorithms and show the comparison with the previous works. To test the effectiveness of the proposed algorithm, the following performance criteria are used: accuracy, time/sec. Table 4 shows the proposed algorithm results comparison between with the previous works in general, as show in Table 4. The database loading has been and as a result the searching time has been reduced moreover, the recognition rate has been increased. In future work we will try to combine another algorithm with the presented system to improve the results providing higher security and quality as compared to existing techniques. Table 4. The comparison with the previous works No. Model Accuracy Time/sec 1 Wang and Xu [27] Medium Medium 2 Dabbaghchian et al. [28] High Medium 3 Chadha et al. [29] Low High 4 Proposed Model High High
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866 864 5.4. Text and image encryption/decryption After make encryption and decryption in our proposed system we evaluate by using (PSNR, MSE, and BER) the result in this case shows the quality of image after decryption in proposed system is good. The make more than 5 experiments in image encryption and decryption, in our proposed system, we use RSA3k algorithm for text encryption and decryption. This algorithm requires 3 keys a public key and a private 2 key, a public key is used only for encryption, and the private key is used only for decryption. Will show the results of two experiments as show in Table 5. Table 5. The experiments text and image encryption/decryption No Images and evaluation 1 Image 1 PSNR 58.9694 MSE 0.0824 BER 0 Time encrypt 0.085478 Time decrypt 0.039626 2 Image 2 PSNR 65.5861 MSE 0.0180 BER 0 Time encrypt 0.084077 Time decrypt 0.021103 3 Image 3 PSNR 67.0376 MSE 0.0012 BER 0 Time encrypt 0.026895 Time decrypt 0.089263 4 Image 4 PSNR 68.4774 MSE 0.0092 BER 0 Time encrypt 0.096635 Time decrypt 0.028295 5 Image 5 PSNR 75.2070 MSE 0.0020 BER 0 Time encrypt 0.091629 Time decrypt 0.024666
  • 8. TELKOMNIKA Telecommun Comput El Control  A proposed model for text and image encryption using different techniques (Shihab A. Shawkat) 865 6. CONCLUSION AND FUTURE WORK In this paper, a novel image security technique is intelligent system to encrypt and decrypt images as well as texts has been proposing; such system has combined two algorithms DCT and SR. In addition, using the RSA3k algorithm the proposed system has been compared with SR algorithm. Simulation results have proven that the proposed system performs better. The database loading has been and as a result the searching time has been reduced moreover, the recognition rate has been increased. In future work we will try to combine another algorithm with the presented system to improve the results providing higher security and quality as compared to existing techniques. REFERENCES [1] S. Sicari, A. Rizzardi, L. A. Grieco, and A. C. -Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015, doi: 10.1016/j.comnet.2014.11.008. [2] S. Abt and H. Baier, “Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research,” 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014, pp. 40-55, doi: 10.1109/BADGERS.2014.11. [3] S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Computer Networks, vol. 57, no. 2, pp. 378–403, 2013, doi: 10.1016/j.comnet.2012.07.021. [4] Ü. Çavuşoğlu, A. Akgül, S. Kaçar, İ. Pehli̇van, and A. Zengin, “A novel chaos‐based encryption algorithm over TCP data packet for secure communication,” Security and Communication Networks, vol. 9, pp. 1285–1296, 2016, doi: 10.1002/sec.1414. [5] R. Sudhakar, R. Karthiga, and S. Jayaraman, “Image compression using coding of wavelet coefficients–a survey,” ICGST-GVIP Journal, vol. 5, no. 6, pp. 25–38, 2005. [Online]. Available: https://static.aminer.org/pdf/PDF/000/320/249/ adaptive_subband_image_coding_considering_spatial_relationship_on_hierarchical_pyramid.pdf [6] F. Li, L. Xin, Y. Liu, J. Fu, Y. Liu, and Y. Guo, “High efficient optical remote sensing images acquisition for nano-satellite framework,” Sensors, Systems, and Next-Generation Satellites XXI, 2017, doi: 10.1117/12.2278171. [7] S. A. Shawkat, “Enhancing Steganography Techniques in Digital Images,” Thesis, Faculty of Computers and Information, Mansoura University Egypt, 2016, doi: 10.13140/RG.2.2.16678.57925. [8] M. V. Rezende, “Evaluation of Face Recognition Technologies for Access Authentication in Automotive Passive Entry Systems with Near Infrared Camera,” Projetos e Dissertações em Sistemas de Informação e Gestão do Conhecimento, vol. 4, 2015. [Online]. Available: https://www.semanticscholar.org/paper/Evaluation-of-Face-Recognition-Technologies-for-in- Rezende/b051ffe615b55278eb9449cd6db543ce5fa3c288. [9] M. Sookhak, F. R. Yu, M. K. Khan, Y. Xiang, and R. Buyya, “Attribute-based data access control in mobile cloud computing: Taxonomy and open issues,” Future Generation Computer System, vol. 72, pp. 273–287, 2017, doi: 10.1016/j.future.2016.08.018. [10] A. Nag et al., “Image encryption using affine transform and XOR operation,” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011, pp. 309-312, doi: 10.1109/ICSCCN.2011.6024565. [11] F. Thabit, S. Alhomdy, A. H. A. Al-Ahdal, and S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, 2021, vol. 2, no. 1, pp. 91–99. doi: 10.1016/j.gltp.2021.01.013. [12] M. Kumari, S. Gupta, and P. Sardana, “A survey of image encryption algorithms,” 3D Research, vol. 8, no. 4, p. 37, 2017, doi: 10.1007/s13319-017-0148-5. [13] S. M. Seyedzade, S. Mirzakuchaki, and R. E. Atani, “A novel image encryption algorithm based on hash function,” 2010 6th Iranian Conference on Machine Vision and Image Processing, 2010, pp. 1–6, doi: 10.1109/IranianMVIP.2010.5941167. [14] M. Waschke, Personal cybersecurity: how to avoid and recover from cybercrime, Apress, 2017, doi: 10.1007/978-1-4842-2430-4. [15] N. A. Al-Otaibi and A. A. Gutub, “2-leyer security system for hiding sensitive text data on personal computers,” Lecture Notes on Information Theory, vol. 2, no. 2, pp. 151–157, 2014, doi: 10.12720/lnit.2.2.151-157. [16] I. Al Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6, pp. 2818–2825, 2019, doi: 10.12928/telkomnika.v17i6.13201. [17] J. Shermina, “Illumination invariant face recognition using Discrete Cosine Transform and Principal Component Analysis,” 2011 International Conference on Emerging Trends in Electrical and Computer Technology, 2011, pp. 826-830, doi: 10.1109/ICETECT.2011.5760233. [18] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A survey of deep neural network architectures and their applications,” Neurocomputing, vol. 234, pp. 11–26, 2017, doi: 10.1016/j.neucom.2016.12.038. [19] S. S. Hameed, H. R. Abdulshaheed, Z. L. Ali, and H. M. Gheni, “Implement DNN technology by using wireless sensor network system based on IOT applications,” Periodicals of Engineering and Natural Sciences (PEN), vol. 10, no. 2, pp. 128-137, 2022, doi: 10.21533/pen.v10i2.2831. [20] D. Singh, I. Nath, and P. K. Singh, “Security and Privacy Challenges in Big Data,” Research Anthology on Privatizing and Securing Data. IGI Global, 2021. doi: 10.4018/978-1-5225-9742-1.ch004. [21] Y. Yu et al., “Cloud data integrity checking with an identity-based auditing mechanism from RSA,” Future Generation Computer System, vol. 62, pp. 85–91, 2016, doi: 10.1016/j.future.2016.02.003. [22] S. A. Shawkat and R. N. Ismail, “Biometric Technologies in Recognition Systems: A Survey,” Tikrit Journal of Pure Science, vol. 24, no. 6, 2019, doi: 10.25130/j.v24i6.899. [23] C. Thirumalai and H. Kar, “Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices,” 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017, pp. 1-6, doi: 10.1109/IPACT.2017.8244948. [24] V. R. Pancholi and B. P. Patel, “Enhancement of cloud computing security with secure data storage using AES,” International Journal for Innovative Research in Science and Technology, vol. 2, no. 9, pp. 18–21, 2016. [Online]. Available: https://www.semanticscholar.org/paper/Enhancement-of-Cloud-Computing-Security-with-Secure-Pancholi-Patel/ 71fad1cfde27b7df42e9b4579f9a623830893029 [25] M. Dalal and M. Juneja, “A secure and robust video steganography scheme for covert communication in H. 264/AVC,” Multimedia Tools and Applications, vol. 80, no. 9, pp. 14383–14407, 2021, doi: 10.1007/s11042-020-10364-z. [26] S. A. Shawkat, K. S. L. Al-badri, and A. I. Turki, “The new hand geometry system and automatic identification,” Periodicals of Engineering and National Scince, vol. 7, no. 3, pp. 996–1008, 2019, doi: 10.21533/pen.v7i3.632.
  • 9.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 858-866 866 [27] W. Wang and L. Xu, “A modified sparse representation method for facial expression recognition,” Computational Intelligence and Neuroscience, vol. 2016, 2016, doi: 10.1155/2016/5687602. [28] S. Dabbaghchian, M. P. Ghaemmaghami, and A. Aghagolzadeh, “Feature extraction using discrete cosine transform and discrimination power analysis with a face recognition technology,” Pattern Recognition, vol. 43, no. 4, pp. 1431–1440, 2010, doi: 10.1016/j.patcog.2009.11.001. [29] A. R. Chadha, P. P. Vaidya, and M. M. Roja, “Face recognition using discrete cosine transform for global and local features,” in 2011 International Conference On Recent Advancements In Electrical, Electronics And Control Engineering, 2011, pp. 502–505. doi: 10.1109/Iconraeece.2011.6129742. BIOGRAPHIES OF AUTHORS Shihab A. Shawkat received the B.Sc. degree in Computer Science from University of Tikrit in 2007 and M.Sc. Degree in Computer Science from Mansoura University in 2017. Mr. Shihab A. Shawkat worked as a teacher during the period from 2008 to 2019 in Directorate of Education in Salah Al-Din, Ministry of Education, Iraq. He has recently started working at the University of Samarra at the end of 2019 till now. His research interest lies in Computer Science, Information Security, image processing and AI. He can be contacted at email: [email protected]. Israa Al-Barazanchi received her Bachelor of Computer Science (BCS) from Department of Computer Science, Baghdad college of economic science university-Iraq- Baghdad in June 2002. In January 2010, she entered the master’s program at the Faculty of Information and Communication Technology, Graduate School of Computer Science (Internetworking Technology), Universiti Teknikal Malaysia. She is Currently a student Doctor of Philosophy in Information and Communication Technology. She is a lecturer in Computer Engineering Techniques Department. Editor-in-chief for international union of universities journal. Member of Editor board in many Scopus journals for computer science field. Head of Researcher group. Member in many conferences panel and communications events. She is a Reviewer of various high impact factor journals. Her research activities are: WBAN, WSN, WiMAX, WiFi on Vehicular Ad-Hoc Networks (VANETs), Communications, Networking, Signal Processing, IOT, Smart Systems, Blockchain. She can be contacted at email: [email protected] and [email protected].