
عمار عبد المجيد غربي الشهابي
Research Interestsتشفير، اخفاء بيانات
الجنس | MALE |
---|---|
Place of Work | Technical Engineering College for Computer and AI / Mosul |
المنصب | مقرر القسم الامن السيبراني |
المؤهل | Master |
التخصص | Data and information security |
البريد الإلكتروني | Ammarmajed@ntu.edu.iq |
الهاتف | 07740895385 |
العنوان | موصل / حي الكفاءات, mosul, Mosul, Iraq |
المهارات
الإبداع والابتكار والمبادرة (80%)
المرونة والقدرة على التكيف (90%)
القيادة وإدارة الفريق (75%)
مهارة العمل الجماعي (95%)
مهارة التواصل مع الآخرين (85%)
مهارة حل المشكلات (85%)
استخدام التكنولوجيا والمراقبة والتحكم (95%)
تكنولوجيا التصميم والبرمجة (90%)
التعليم
دبلوم انظمة الحاسوب
Sep 2, 2001 - Aug 3, 2003بكالوريوس علوم الحاسوب
Sep 1, 2004 - Aug 3, 2008ماجستير علوم الحاسوب
Aug 1, 2018 - Sep 1, 2021خبرة العمل
انترنيت الطلبة و المنتسبين و الاتصالات [مسؤول وحدة الانترنيت]
Jan 1, 2008 - Jun 10, 2014في المعهد التقني نينوى
في المعهد التقني نينوى [مقرر قسم تقنيات انظمة الحاسوب]
Nov 1, 2021 - Nov 1, 2023الكلية الهندسية التقنية للحاسوب والذكاء الاصطناعي [مقرر قسم الامن السيبراني]
Oct 1, 2025 - حاليالمنشورات
A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key
Jun 1, 2025المجلة Egyptian Informatics Journal
publisher Nineveh Technical Institute
العدد 100692
المجلد 30
Hiding in image files is one of the widespread techniques to achieve information security, as it has proven its efficiency. Because of the hiding technology has become the best way to maintain the confidentiality of private information, the attackers have doubts about any translated media, such as various image files, because the possibility of containing important confidential data, then trying to use different methods and algorithms to extract its containing. Therefore, the traditional methods of regular and sequential hiding have become at a steady pace within the media, weak and easy to detect by the attackers, so the trend was to find a new algorithm that adopts the method of random hiding scattered within those media. During the research, a method was developed to hide secret files inside true color images, by distributing the content of it within the image elements in a way that makes the distance between the locations of the image elements in irregular and not fixed space, based on an algorithm random distribution depend on a large prim secret key that agreed upon paging coefficient among the authorized persons, which makes it difficult to extract the hiding locations of those parts within them using image analysis methods, or through statistical analyzes that used in this field. This method succeeded in hiding the secret files without causing a state of distortion to the original image, or the possibility of noticing the changes that occurred in it as a result of the hiding process, and these files were easily retrieved without losing any of their components, in addition to the fact that this extracting process takes place without require the original cover image or need to create a table of shows hiding locations. © 2025
Honey Encryption Security Techniques: A Review Paper
Jun 17, 2022المجلة مجلة الرافدين لعلوم الحاسوب و الرياضيات
publisher كلية علوم الحاسوب والرياضيات
DOI https://doi.org/10.33899/csmj.2022.174390
العدد 1
المجلد 16
From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form. The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key.