Computer
Mohanad A. Mohammed; Hala B. Abdul Wahab
Abstract
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...
Read More ...
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and outcomes from this conversion. An encryption scheme homomorphic technique (HE) is a method that encrypts the cipher data without the need to decrypt it,paillier encryption method is used. This paper aims to propose a system that integrates Paillier cryptosystem homomorphic technology with IoT and lightweight blockchain technology to provide decentralization to the IoT environment and improve security. The proposed system results in improving the IoT device’s work environment by solving the main challenges of security using blockchain, privacy using homomorphism, and data volume using blockchain. The data set used to implement and evaluate the proposed system is industrial internet of things data The dataset used in this paper is generated via machine industry 4.0 Storage System status which represents the system failure and work status. this system is evaluated using standard metrics used to evaluate the blockchain effectiveness and time, resources consumed and shows better results in time and power consumption.
Donya Yasir Abdulhussain; Hala bahjat; Abdulmohsen Jaber Abdulhoseen
Abstract
Digitally, a large number of information was generated, stored and exchanged. This growth leads to problems that needed to solve. Digital watermarking has been one of the key terms to secure and authenticate the owner's information.
The watermarking image technology is a procedure for embedding secret ...
Read More ...
Digitally, a large number of information was generated, stored and exchanged. This growth leads to problems that needed to solve. Digital watermarking has been one of the key terms to secure and authenticate the owner's information.
The watermarking image technology is a procedure for embedding secret data into an original image. In this paper, encrypted holographic watermark image was proposed by using chaotic technique, which utilizing three distinct chaos maps: logistic, Arnold and Baker; to ensure the security to the system.
Performance evaluation of embedding and decrypted Watermark image measured by Peak to signal ratio (PSNR), Structural Similarity (SSIM), Mean square error (MSE), Root mean square (RMSE), and Normalize Root mean square (NRMSE).
Results and outcomes of measurements confirmed the robustness of the chaotic technique and also the Histogram showed the good distribution of the encrypted holographic image pixels and observed that the encrypted holographic image in bit are significantly uniform and different from that of the Watermark image that mean the encryption image in bit interleaver is change the level values and position of pixel and also good similarity SSIM about 0.9 for both test 1 and 2.
Zainab Mohammed Muneef; Hala bahjat; Abdulmohsen Jaber Abdulhoseen
Abstract
With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over ...
Read More ...
With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over public unsecured channels. The Homomorphic property is used in this paper, which is comprised of three steps: key generation, encryption, and decryption. To realize such approach, the encryption cryptosystem must support additional operation over encrypted data. This cryptosystem can be effective in protecting images and supporting the construction of programs that can process encrypted input and produce encrypted output.