Amal Abdulbaqi Maryoosh

@uomustansiriyah.edu.iq

Mustansiriyah University



              

https://researchid.co/amalmaryoosh

RESEARCH INTERESTS

Cryptography, Data mining, Machine Learning, Image processing

5

Scopus Publications

100

Scholar Citations

6

Scholar h-index

3

Scholar i10-index

Scopus Publications

  • Image confusion and diffusion based on multi-chaotic system and mix-column
    Amal Abdulbaqi Maryoosh, Zahraa Salah Dhaif, and Raniah Ali Mustafa

    Institute of Advanced Engineering and Science
    In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.

  • A new block cipher for image encryption based on multi chaotic systems
    Donia Fadhil Chalob, Amal Abdulbaqi Maryoosh, Zainab Mohammed Esa, and Elaf Nassir Abbud

    Universitas Ahmad Dahlan
    In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.

  • Block image encryption based on modified playfair and chaotic system
    Ekhlas Abbas Albahrani, Amal Abdulbaqi Maryoosh, and Sadeq H. Lafta

    Elsevier BV
    Abstract A new image encryption was done through using chaotic theory in the diffusion and confusion processes. Diffusion process was performed by using the chaotic cross map to permutate the matrix of each image color channel. Confusion process was implemented by a modified Playfair algorithm to generalize the classical one. Playfair algorithm divides the original text of characters into blocks, where each block usually contains two-character. The main limitations of Playfair cipher are that: it encrypts only 25 characters and one cannot use special characters and numbers. In addition, keyword can only take 25 letters alone without duplicates. The new method uses two cross chaotic maps to generate 16×16 playfair matrix as a key. The image is partitioned into a definite number of blocks such that each block has 16×16 bytes. Then, each block will be encrypted by different playfair matrix. All input data such as capital letter, small letter, digits and special characters, etc. can be encrypted by this new method. Experimental results showed that the proposed playfair cipher is more secure than the classical one and very sensitive to a slight change in the secret keys. The actual results of the encryption process showed that the proposed algorithm can defend against different attacks.

  • Iris images encryption based on QR code and chaotic map
    Raniah Ali Mustafa, Amal Abdulbaqi Maryoosh, Dena Nadir George, and Waleed Rasheed Humood

    Universitas Ahmad Dahlan
    In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.

  • A new block cipher algorithm for image encryption based on chaotic system and S-Box


RECENT SCHOLAR PUBLICATIONS

  • A Review: Data Mining Techniques and Its Applications
    AA Maryoosh, EM Hussein
    International Journal of Computer Science and Mobile Applications 10 (3), 1-14 2022

  • Image confusion and diffusion based on multi-chaotic system and mix-column
    AA Maryoosh, ZS Dhaif, RA Mustafa
    Bulletin of Electrical Engineering and Informatics 10 (4), 2100-2109 2021

  • Subject Review: Feature Extraction Based on Palm Print
    RA Mustafa, AA Maryoosh, ZS Dhaief
    2021

  • Subject Review: Information Hiding Using Chaotic Map
    ZS Dhaief, RA Mustafa, AA Maryoosh
    2021

  • Image Confusion and Diffusion Based on Multi-Chaotic system and Mix-Column
    AAM Zahraa salah daief, Rahiah Ali Mustafa
    Bulletin of Electrical Engineering and Informatics 10 (4) 2021

  • Subject Review: Information Steganography Based on Different Methods
    AA Maryoosh, ZS Dhaief, RA Mustafa
    2021

  • A new block cipher for image encryption based on multi chaotic systems
    DF Chalob, AA Maryoosh, ZM Esa, EN Abbud
    TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 2020

  • Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique
    ZS Dhaief, RA Mustafa, AA Maryoosh
    International Journal of Engineering Research and Advanced Technology 2020

  • Iris images encryption based on QR code and chaotic map
    RA Mustafa, AA Maryoosh, DN George, WR Humood
    Telkomnika 18 (1), 289-300 2020

  • Block image encryption based on modified playfair and chaotic system
    SHL Ekhlas Abbas Albahrani, Amal Abdulbaqi Maryoosh
    Journal of Information Security and Applications 51 2020

  • Review: Image Encryption Techniques based on Chaotic Map
    AA Maryoosh, RAM Zahraa Salah Dhaief
    International Journal of Engineering Research and Advanced Technology 2019

  • Image encryption techniques based on chaotic map
    AA Maryoosh, RA Mustafa, ZS Dhaief
    Int. J. Eng. Res. Adv. Technol IJERAT (ISSN: 2454-6135) 5 (9), 01-05 2019

  • Subject review: cloud computing security based on cryptography
    AA Maryoosh, RS Mohammed, RA Mustafa
    International Journal of Engineering Research and Advanced Technology-IJERAT 2019

  • Recognition of Retain Images Based on Association Rules
    RA Mustafa, ZS Dhaief, HS Chyad, AA Maryoosh
    International Journal of Engineering Research and Advanced Technology 2019

  • A New Block Cipher Algorithm for Image Encryption Based on Chaotic system and S-Box
    AAB Maryoosh
    International Journal of Civil Engineering and Technology 9 (13), 318-327 2018

  • Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC)
    SA Abbas, AAB Maryoosh
    International Journal of Applied Information Systems 10 (6) 2016

  • Improving data storage security in cloud computing using elliptic curve cryptography
    SA Abbas, AA Maryoosh
    IOSR Journal of Computer Engineering 17 (4), 48-53 2015

MOST CITED SCHOLAR PUBLICATIONS

  • Block image encryption based on modified playfair and chaotic system
    SHL Ekhlas Abbas Albahrani, Amal Abdulbaqi Maryoosh
    Journal of Information Security and Applications 51 2020
    Citations: 31

  • Improving data storage security in cloud computing using elliptic curve cryptography
    SA Abbas, AA Maryoosh
    IOSR Journal of Computer Engineering 17 (4), 48-53 2015
    Citations: 15

  • Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC)
    SA Abbas, AAB Maryoosh
    International Journal of Applied Information Systems 10 (6) 2016
    Citations: 10

  • Image confusion and diffusion based on multi-chaotic system and mix-column
    AA Maryoosh, ZS Dhaif, RA Mustafa
    Bulletin of Electrical Engineering and Informatics 10 (4), 2100-2109 2021
    Citations: 9

  • Iris images encryption based on QR code and chaotic map
    RA Mustafa, AA Maryoosh, DN George, WR Humood
    Telkomnika 18 (1), 289-300 2020
    Citations: 9

  • A new block cipher for image encryption based on multi chaotic systems
    DF Chalob, AA Maryoosh, ZM Esa, EN Abbud
    TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 2020
    Citations: 7

  • Subject review: cloud computing security based on cryptography
    AA Maryoosh, RS Mohammed, RA Mustafa
    International Journal of Engineering Research and Advanced Technology-IJERAT 2019
    Citations: 6

  • Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique
    ZS Dhaief, RA Mustafa, AA Maryoosh
    International Journal of Engineering Research and Advanced Technology 2020
    Citations: 5

  • A New Block Cipher Algorithm for Image Encryption Based on Chaotic system and S-Box
    AAB Maryoosh
    International Journal of Civil Engineering and Technology 9 (13), 318-327 2018
    Citations: 5

  • A Review: Data Mining Techniques and Its Applications
    AA Maryoosh, EM Hussein
    International Journal of Computer Science and Mobile Applications 10 (3), 1-14 2022
    Citations: 1

  • Image encryption techniques based on chaotic map
    AA Maryoosh, RA Mustafa, ZS Dhaief
    Int. J. Eng. Res. Adv. Technol IJERAT (ISSN: 2454-6135) 5 (9), 01-05 2019
    Citations: 1

  • Recognition of Retain Images Based on Association Rules
    RA Mustafa, ZS Dhaief, HS Chyad, AA Maryoosh
    International Journal of Engineering Research and Advanced Technology 2019
    Citations: 1