Profile Image
Lecturer

Aamer Tahseen Suhail

Research Interests

Gender MALE
Place of Work Technical Management Institute Nineveh
Position NTU
Qualification Master
Speciality Cyber security
Email aamir@ntu.edu.iq
Phone 07740895400
Address Al-shurta, Technical Management institute Nineveh, Mosul, Iraq
About Me

Publications

Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA
Nov 5, 2024

Journal Ain Shams Engineering Journal

publisher SCIENCEDIRECT

DOI 10.1016/j.eij.2022.06.003

Issue 11

Volume 15

Abstract Frequency hopping is a main technique for wireless communication, avoiding interference and interception. This paper provides novel hardware design for frequency-hopping pseudorandom bit generator (PRBG).PRBG design by chaotic maps on FPGA.Two proposed methods in this work first combine chaotic maps in a cascade manner called fixed point cascade chaotic maps (FPCCM-FHSS), and second, the conjunction of chaotic maps done in an XORed manner called fixed point an XOR chaotic method (FPXORCM-FHSS).The results were the first eight NIST randomness tests.Frequency indicates that all p-values larger than 0.01 are needed to achieve better randomness,Second and third were die-hard tests, many distribution tests with significant p-values (p <0.01) that meet high standards of statistical randomness, making them suitable for channel security.Last were the FPGA results between the proposed methods for speed and hardware resources).The works implemented on XILINX ZC702 achieved 2 Gbps to meet the speed requirements of the change of the carrier frequency.

Read Publication

A new method for hiding a secret file in several WAV files depends on circular secret key
Jul 22, 2022

Journal Egyptian Informatics Journal

publisher ScienceDirect

DOI 10.1016/j.eij.2022.06.003

Issue 4

Volume 23

Abstract The technique of information hiding is very important in achieving security of important and sensitive data, especially those that are transmitted through various digital communication channels because it has robust characteristics that distinguish it from encryption techniques, the most important of which is that it is not perceived by protrusive and hackers, as it is based on the principle of hiding those data inside other digital media as a carrier cover. On the other hand, with the development of hiding techniques, techniques developed to try extracting its hiding to hacking its contents, for this reason and to increase the efficiency of these methods, the encryption and hiding techniques was combined together. The proposed method depends on distributing secret data on several digital audio files of type WAV in random way depends on circular secret key values that is generated in random order that be agreed upon between the sender and the receiver. This technique has achieved high durability, and in the event of suspicion of the existence of secret content within any WAV file, the multiplicity of carrier files and their different length, as well as random distribution of data in them, all these characteristic eliminates the suspicion of any confidential content, as well as complicates the file retrieved process if the suspicion be occurs.

Read Publication

Review of Encrypted Virus: Detection analyses Methods
Jun 3, 2021

publisher IEEE

DOI 10.1016/j.eij.2022.06.003

Volume 7

Most of the recent researchers had a great interest in encrypted virus detection. This interest came after the continuous production of encrypted viruses. The machine learning algorithms had been implemented to build an efficient detector. Some of these researches proposed a signature-based method that might not be able to detect recent encrypted viruses. Therefore, other researchers built their methods upon the encrypted virus's behaviour without seeking its signature. The behaviour-based or heuristic-based methods could detect encrypted malicious, including encrypted viruses. The detection methods had analyzed their inputs through either static or dynamic analysis. Some other researches had analyzed their inputs via hybrid analysis. Several monitor applications had been used in several virtual machine types. Most of the researches had been performed in a windows environment, where others in an android environment. An evaluation of these methods had been performed via criteria of comparison to determine the most effective method. The comparison results showed that the mainstream virus divided detection had 100% in windows, and a run-time mobile malware detector had 100% accuracy.

Read Publication

Hide a Secret File in Several BMP Images using the Circular Secret Key
Sep 3, 2020

publisher EAI

DOI 10.1016/j.eij.2022.06.003

Issue 1

Abstract Digital data hiding technique is very important in achieving important and sensitive data security, especially those are transmitted through various digital communication channels, it differs from encryption technique, by unperceived or perceived by hackers, as it is based on the principle of hiding those Data within other digital media as their carrier covers. With the development of these hiding techniques, another technique developed to decipher the content of these data, to increase the efficiency of hiding methods of steganography and cryptography techniques should be merged. In this research the distribution of data to be hidden on a set of digital images of the type of BMP was adopted in a random way based on a circular secret key that created randomly and at an agreed length between the sender and the receiver, therefore this method eliminates the suspicion of any confidential content, as well as complicates the data retrieved process.

Read Publication