Noura Ahmed Mawla

@ruc.edu.iq

Computer Science
AL-Rafidain University College



                 

https://researchid.co/noura_ahmed

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Software

3

Scopus Publications

13

Scholar Citations

2

Scholar h-index

Scopus Publications

  • Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
    Noura A. Mawla and Hussein K. Khafaji

    MDPI AG
    Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without interference from an unauthorized third party. This paper proposes a modern approach to cryptography and steganography based on exploiting a new environment: bases and protein chains used to encrypt and hide sensitive data. The protein bases are used to form a cipher key whose length is twice the length of the data to be encrypted. During the encryption process, the plain data and the cipher key are represented in several forms, including hexadecimal and binary representation, and several arithmetic operations are performed on them, in addition to the use of logic gates in the encryption process to increase encrypted data randomness. As for the protein chains, they are used as a cover to hide the encrypted data. The process of hiding inside the protein bases will be performed in a sophisticated manner that is undetectable by statistical analysis methods, where each byte will be fragmented into three groups of bits in a special order, and each group will be included in one specific protein base that will be allocated to this group only, depending on the classifications of bits that have been previously stored in special databases. Each byte of the encrypted data will be hidden in three protein bases, and these protein bases will be distributed randomly over the protein chain, depending on an equation designed for this purpose. The advantages of these proposed algorithms are that they are fast in encrypting and hiding data, scalable, i.e., insensitive to the size of plain data, and lossless algorithms. The experiments showed that the proposed cryptography algorithm outperforms the most recent algorithms in terms of entropy and correlation values that reach −0.6778 and 7.99941, and the proposed steganography algorithm has the highest payload of 2.666 among five well-known hiding algorithms that used DNA sequences as the cover of the data.

  • An Ultra Lightweight Cipher Algorithm For IoT Devices and Unmanned Aerial Vehicles
    Noura A. Mawla and Hussein K. Khafaji

    IEEE
    Drones and the Internet of Things (IoT) have become of paramount importance to individuals, entities, organizations, and states due to the benefits they provide in daily life. Most of the consumer devices around us have become connected to the Internet, no matter how small they are, including smart home applications, automatic sensors, portable medical devices, implants inside the human body, etc. The connection of these devices to the Internet has opened the way for many intrusions, either to steal data or cause harm to humans. This research suggests a method to protect this data from being exposed to security breaches by proposing a new lightweight encryption algorithm. The proposed algorithm presents new ways to encrypt data by exploiting the different faces of the characters in ASCII code, where the text is converted into four different forms, including binary, hexadecimal, characters, and digits. Each of these forms undergoes a certain process, either summation or subtracting, or passing it through the logic gates to obtain high encoding confidentiality to give more complexities to increase data security. Experimental results of the proposed algorithm show a significant improvement in coding rate with high encryption and decryption speeds, in addition to the correlation coefficient and entropy reaching -0.4735 and 7.9983, respectively.

  • Protein Motifs to Hide GA-Based Encrypted Data
    Noura A. Mawla and Hussein K. Khafaji

    Hindawi Limited
    The arms of the Internet octopus have reached the ends of the planet. As it has become indispensable in our daily lives, huge amounts of information are transmitted through this network, and it is growing momentarily, which has led to an increase in the number of attacks on this information. Keeping the security of this information has become a necessity today. Therefore, the scientists of cryptography and steganography have seen a great and rapid development in the previous years to the present day, where various security and protection techniques have been used in these two technologies. In this research, it was emphasized to secure the confidentiality and security of the transmitted data between the sending and receiving parties by using both techniques of encryption and steganography. In contrast, where genetic algorithms and logic gates are exploited in an encryption process, in an unprecedented approach, protein motifs are used to mask the encoded message, gaining more dispersion because there are 20 bases used to represent the protein. The real payload gained ranges between 0.8 and 2.666, which outperforms the algorithms that depend on DNA sequences.

RECENT SCHOLAR PUBLICATIONS

  • Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
    NA Mawla, HK Khafaji
    Computers 12 (8), 166 2023

  • An Ultra Lightweight Cipher Algorithm For IoT Devices and Unmanned Aerial Vehicles
    NA Mawla, HK Khafaji
    2023 International Conference On Cyber Management And Engineering (CyMaEn 2023

  • Protein Motifs to Hide GA-Based Encrypted Data
    NAMHK Khafaji
    Scientific Programming 2022

  • A New Algorithm to Preserve Sensitive Frequents Itemsets (APSFI) in Horizontal or Vertical Database
    NAMAS Dr. Hussein K. AL-Khafaji
    Eng. and Technology Journal 2013

  • OFGIM: A New Algorithm to Mine Generalized-Itemsets.
    NAMAS Dr. Hussein K. AL-Khafaji
    AL_Rafidain University College for Sciences 2013

  • ESLNP: Extra Security Layer Network Protocol
    NAMAS Dr. Hussein K. AL-Khafaji
    2011

  • A Search Engine Based on Multi-Agent-System
    NAM Al-Saedi
    AL-MANSOUR Journal 2011

  • DWORM: A Novel Algorithm To Maintain Large Itemsets in Deleted Items and/or Transactions Databases Without Re-Mining
    NAMAS ,Dr. Hussein K. AL-Khafaji
    Al-Rafidain University College For Sciences, 5-24 2010

  • Automatic Construction of General Non-Recurrent Neural Network Using Genetic Programming
    NAM Al-Saedi
    AL_Rafidain University College for Sciences 2009

  • A New Algorithm to Update Large Itemsets in Dynamic Database
    NAMAS Dr. Hussein K. AL-Khafaji
    AL_Rafidain University College for Sciences 2007

MOST CITED SCHOLAR PUBLICATIONS

  • Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
    NA Mawla, HK Khafaji
    Computers 12 (8), 166 2023
    Citations: 7

  • An Ultra Lightweight Cipher Algorithm For IoT Devices and Unmanned Aerial Vehicles
    NA Mawla, HK Khafaji
    2023 International Conference On Cyber Management And Engineering (CyMaEn 2023
    Citations: 4

  • Protein Motifs to Hide GA-Based Encrypted Data
    NAMHK Khafaji
    Scientific Programming 2022
    Citations: 2