Abdul Monem S. Rahma

Work place: Computer Science Department, University of Technology, Baghdad, Iraq

E-mail: Monem.rahma@yahoo.com

Website:

Research Interests: Computer systems and computational processes, Computer Vision, Image Compression, Image Manipulation, Image Processing

Biography

Prof. Abdul Monem S. Rahma Ph.D obtainer his M.Sc. from Brunel University and his Ph.D. from Loughborough University of Technology United Kingdom in 1982, 1984 respectively. He taught at Baghdad University Department of Computer Science and the Military Collage of Engineering, Computer Engineering Department from 1986 till 2003. He holds the position of Dean Asst. of the Scientific Affairs and works as a professor at the University of Technology, computer Science Department. He published 88 Papers, 4 Books in the field of computer science, supervised 28 Ph.D. and 57 M.Sc. students. His research interests include Computer Graphics Image Processing, Biometrics and Computer Security. And he has attended many scientific global conferences in Iraq and many other countries. From 2013 to Jan. 2015 he helds the position of Dean of the Computer Science College at the University of Technology.

Author Articles
New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

By Instructor Omar A. Dawood Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2017.04.04, Pub. Date: 8 Apr. 2017

In this paper, we have proposed a new iterated symmetric cipher, which is designed with Substitution and Permutation Network (SPN) structure and depends on strong mathematical built. It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages. Starting by the SubByte operation, ReversibleShiftrows operation, ReversibleMixcolumns operation, and Round key addition. The proposed operations in this cipher have implemented in a straightforward manner relatively in both Encryption/Decryption by an elegant way. These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates the difference of execution times as well as creates a balance in forward and backward operations. The proposed cipher interested with modern design by adopted new algebraic operations and clear mathematical notations to ensure a high level of security. The proposed cipher did not build suddenly or arbitrarily but it acts as a sequence of developments and represents as a long process of design for long time, since several proposed ciphers have been published recently by us that paved the way to its new design, so the designed cipher inherited a good properties from a proven famous algorithms’ features to produce high resistance against all known attacks and to submit a high performance on many platforms and in a wide range of hardware and software applications.

[...] Read more.
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera

By Instructor Baidaa A. Atya Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2017.03.04, Pub. Date: 8 Mar. 2017

In the last decades, monitoring cameras begin to play a vital role in securing sensitive systems such as government sites or establishments. Generally, these kinds of cameras are fixed-location (i.e. outdoor camera) such that the viewpoint is limited to small area and not covering the whole place. In addition, there are some drawbacks that appear when using these kinds of cameras such as being breakable (intentionally or not) which may lead to camera malfunction or breaking in the linked electrical wires that may cause disconnection between the camera, monitor and its receiver. However, the main problem is the lacking of secure protecting system that prevents intruders from entering into the system disabling or malfunction it.
In this research a new system is proposed in order to solve these problems by using wireless-mobile camera with embedded programmable operating system which enables controlling this camera remotely by sending wireless commands through the embedded component called Arduino card controller. This card enables the connection between the camera and the server to be programmatic by the user or developer. The main goal of this research is to design a monitoring system to detect any suspicious events and to ensure that the transferring monitoring data from the camera to the server is not infiltrated by unauthorized person by applying a set of techniques from image detection, object tracking and security algorithms to the instructions or the program of the camera. Compared with other researches, this work achieved the following goals: 1- Using Arduino card for programming the camera. 2- IP camera does not require user name and password. 3- The images and the other information are (encrypted) when sending to/from computer, 4- Using Mobile-wireless camera. 5- Process of keys exchanging between camera and computer. The results of this research are good and achieved the main goals of new developed technique.

[...] Read more.
Generalized Method for Constructing Magic Cube by Folded Magic Squares

By Omar A. Dawood Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijisa.2016.01.01, Pub. Date: 8 Jan. 2016

In the present paper we have developed a new method for constructing magic cube by using the folded magic square technique. The proposed method considers a new step towards the magic cube construction that applied a good insight and provides an easy generalized technique. This method generalized the design of magic cube with N order regardless the type of magic square whether odd order, singly even order or doubly even order. The proposed method is fairly easy, since it have depended mainly on the magic square construction methods, and all what the designer need is just how to builds six magic square sequentially or with constant difference value between each pair of the numbers in the square matrix, whereby each one of this magic square will represents the surface or dimension for magic cube configuration. The next step for the designer will be how to arrange each square in the proper order to constitute the regular cube in order to maintain the properties of magic cube, where the sum of rows, columns and the diagonals from all directions are the same.

[...] Read more.
The New Block Cipher Design (Tigris Cipher)

By Omar A. Dawood Abdul Monem S. Rahma Abdul Mohsen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2015.12.02, Pub. Date: 8 Nov. 2015

In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published. It has been designed with a good coherent structure that is based on solid algebraic and well mathematical opinions. The proposed cipher uses the SPN structure and what is known by the Galois Field GF (28). It is an iterated cipher that has a conservative design which is easily implemented on both hardware and software. It operates with block size of 128-bits and with three variable key lengths of 128-bits, 192-bits and 256-bits in addition to sixteen rounds or multiples of four rounds. The proposed cipher works with good invertible operations’ stages and a compact duplicated ciphering key. The Tigris cipher construction strategy includes the adoption of construction a new S-box with high non-linearity that uses the same routines of the AES-S-box stage but with different modular arithmetic of irreducible polynomial and different affine matrix in addition to the distinct constant vector. The second and the third layers of the proposed model are based on the shifting concept for the confusion and diffusion process with reversible operations. The last layer of the proposed model is the key addition layer that is responsible for the expanding and generating the ciphering key by two directions those of row and column expansion, which are associated with two constant vectors of golden ratio and base nature algorithm as a fixed word to eliminate any weak or semi-weak ciphering key.

[...] Read more.
Other Articles