Prof. Dr. Maisa'a Abid Ali Khodher AL-Dabbas

Computer Engineering Department

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prof. Dr. /Computer Security/University of Technology/computer sciences/IRAQ/2016

Security, image processing, steganography, Electronics Work Bench EWB, Matlab

1- New Approach to Partial Cryptography Using 2D Wavelet Transform. Published: Al-Rafidain Journal , 2010.
2- Modification Approach Method for RC4 Using 2D Wavelet Transform. Published: l AL-Mustansiriya Journal of Science 2011.
1- Proposed Method for Partial Audio Cryptography Using Haar Wavelet Transform. Published: Iraqi Journal of Computer Communication and Control Engineering IJCCCE , 2013.
2- To Modify Partial Audio Cryptography for Haar Wavelet Transform by Using AES Algorithm. Published Journal of Eng.& Tech., 2014.
3- Modifying Randomized Transform Image Steganography Using IDWT. Published :Al-Yarmouk University College Journal ,2014.
4- A Proposal of Steganography Algorithm by random Image Transform. Published: Al-Rafidain Journal , 2015.
5- A Proposal Algorithm for Image Steganography by Hue Wavelet Transform Using Histogram. Published: AL- Mustansiriya /Journal of College of Education 2015.
6- Arabic Language Script Steganography Based on Dynamic Random Linear Regression. Published: AL-Mustansiriya /Journal of College of Education, 2016.
10- Arabic Language Text Steganography Based on Microsoft Word Documents, Published: Al-Yarmouk University College Journal , 2016.
11- Steteganography in Arabic Texts using by Kashida using STRI as RNG. Published: Iraqi Journal of Science Vol.57 No. 2C, 2016.
12- Steganography Techniques for Arabic Language Texts Utilizing Single- Double Quotation Using RNG. Published: Journal Of The College Of Basic Education 2016.
13- Arabic Language Text Steganography Based on Singular Value Decomposition (SVD). Published: Journal of Eng. & Tech. 13/7/2016.
14- Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG). Published: Journal Al-Mansour Journal 16/2/2016.
15- Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG. Published : Journal od Amam Al-Sadiq, 2017.
16- Comparison of Eight Proposed Security Methods using Linguistic Steganography Text. International Journal of Computing & Information Sciences Vol. 12, No. 2, December 2016.
17-Steganography Arabic Text Based on Natural Language Process Documents. Published: Waste/ Journal of Education College, 2016.
18- Proposal Cryptography Algorithm based on Bit Plane Image Slicing Using Wavelet Transform. Published: Al-Yarmouk University College Journal, Vol. 9 -2017.
19- Modify Algorithm Cryptography by Image Detection Using Wiener Filter.
Published: Al-Yarmouk University College Journal,15/10/2019.
20- 20- Hide 20- Secret Message in Raster Image for Transmission to Satellites Using a 2-D Wavelet Packet. Published: Iraqi Journal of Science, Vol.59, Issue 2B, May 2018, pp: 922-933.
21-A New Sort Algorithm for Multi Core Parallel Computers. Published: Associate of Information and Technology in Ministry of Higher Education Vol. 9, No.1, 2018. 22- Steganography Secret Message Using Wavelet 2D Image Fusion, Published: Journal of Mathematics and Statistical Science, 420-432 | Science Signpost Publishing in Vol. 4, December 2018.
23-Reduces Solution Of Fredholm Integral Equation To a System Of Linear Algebraic Equation. Published: International Journal of Mathematics Trends and Technology (IJMTT). published in – Volume 61 Issue 2, September2018.
24-Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk), Published: Baghdad Science Journal, Vol.15(4)2018. Scopus, score citation = 0.12 25- Steganography Secret Message based on Image Sharpening Using 2D Haar Wavelet Transform, 4th conference college of Middle Technique management /Baghdad- 2018, Published: proceeding in may 2019.
26- New Algorithm Conceals Secret Message Based on the Internet of Things (IoT), Published: Journal of Engineering and Applied Sciences 14, pp.5592- 5597, 2019.
27- Proposal for a Cryptographic Image Vector based on 2D HWP Using the Secure Force Method, Published : Associate of Information and Technology in Ministry of Higher Education Vol.10 , No.1 , 2020.
28-Suggesting an Analysis System for Monitoring Free-hand Gymnastics for Training Youth. Published: 2nd Scientific Conference of Computer Sciences2019 EEE, IEEE explore, 2019.
29- Image plagiarism system for forgery detection in maps design. Puplished: 2nd Scientific Conference of Computer Sciences2019 IEEE, IEEE explore, 2019.
30- Approach Based on Fragmentation of English Text Pictures to Speed Up Recognition of Characters on a Multi-Core Computer. Published: Diyala Journal for Pure Science, Vol.15, No.4, 2019.
31-Propose Forgery Detection Plagiarism System in Maps Design Based on the Combination of SIFT Detector and SURF Descriptor. Published: Associate of Information and Technology in Ministry of Higher Education 2019 .
32- Concealed Secret Letter Using a 2DWavelet Packet, 4 th conference in Maltepe University / Istanbule / Turkey/AIP conference Proceedings, 2 April 2019. 33- Image Steganography Using Least Significant Bit and Secret Map Techniques.
Publishing: in International Journal of Electrical and Computer Engineering (IJECE), Vol. 10, No. 1, February 2020, pp. 35~946.
34- Novel Approach for Detection Insider Attacker Using Rule Based On Body Language. International AL Scientific Conference of The University of Babylon (ISCUB-2019). IEEE explore 2019.
35-Review Paper on Software Risks Factors. International first conference college of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012007.
36-Key Generation Based on Henon Map and Lorens System. Published: Journal of Al-Mustansiriy science, Vol. 31, 2020.
37-Hide Secret Message in Image Transform Conformal Mapping Based Image 2DHWT, Journal of Physics: Conference Series, 1963 (2021) 012098, IOP.
38-Arabic command based human computer interaction, International first conference college of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012027. IOP.
39- Review: A comparison Steganography Between Texts and Images, International conference six th Iraqi Al-Khawarizmi Association , Journal of Physics: Conference Series 1591 (2020) 012024 IOP Publishing.
40- Hybrid Filter for Enhancing Input Microphone-Based Discriminative Model, Iraqi Journal of Science, 2020, Vol. 61, No. 9, pp: 2434-2439.
41- Dual method cryptography image by two force secure and steganography secret message in IoT, TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2928~2938
42- Image steganography using least significant bit and secret map techniques, International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 1, February 2020, pp. 935~946.
43- Suggested Video Steganography Algorithm Based on Power Low Transform (PLT) Using IoTs, Journal of Physics: Conference Series 1897 (2021) 012025 IOP Publishing.
44- A Novel Approach for Detection Insider Attacker Using Body Language Journal of Physics: Conference Series 1804 (2021) 012129 IOP Publishing.
45- Wheelchair Movement Based on Convolution Neural Network, Engineering and Technology Journal Vol. 39, (2021), No. 06, Pages 1019-1030.
46-An Improved Method for Combine (LSB and MSB) Based on Color Image RGB, Engineering and Technology Journal Vol. 39, Part B (2021), No. 01, Pages 231-242.
47-Data Hiding by Unsupervised Clustering Using Fuzzy C-Mean, Design Engineering, Year 2021 Issue: 7 | Pages: 14192-14210.
48- Hide Encryption Secret Message in Video Frames Based on MapReduce, Design Engineering, Year 2021 Issue: 7 | Pages: 15229-15243.
49-Hide Secret Script Encryption in Video Frames Based on Magic Square, Al-Qadisiyah Journal of Pure Science Vol. (26) Issue (Special issue num.4) , (2021) pp. 529–541.
50-Data Hiding by Unsupervised Machine Learning Using Clustering K-mean Technique, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 4, December 2021.
51- 51-Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 2, June 2021.
52-Concealing a Secret Message in a Colour Image Using an Electronic Workbench, Iraqi Journal of Science, 2021, Vol. 62, No. 12, pp: 4964-4977.
53-A Novel Approach for Detection Insider Attacker Using Body Language, Journal of Physics: Conference Series 1804 (2021) 012129.
54-Insider Attacker Detection Using Light Gradient Boosting Machine,TECH- WLEDGE Journal, Volume 1, Issue 1, 2021, pp:67-76.
55-Review: Secure data hiding by machine learning in cloud, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 37-43.
56-Machine Learning for Satellite Images Classification using Spectral Signature for Features Extraction, Journal of Iraqi, Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 27-36.
57-An Image Steganography By using 2 D Integer Wavelet Packet Based on Adaptive Non Maximal Suppression, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 57-68.
58-Using the principle of mapreduce for steganography to hide the encrypted message in video based on pvd method, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 44-56.
59-Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map, Iraqi Journal of Science, 2022, Vol. 63, No. 12, pp: 5534-5548.
60-A Novel Lightweight Image Encryption Scheme, Computer and material & Continua, CMC, 2023, vol.75, no.1, pp:2137-2153.
61-Satellite Images Classification Using CNN: Survey, IEEE Xplore, 2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
62-Satellite Image Classification using Spectral Signature and Deep Learning, Iraqi Journal of Science, 2023, Vol. 64, No. 6, pp: 4053-4063.
63-Medical image encryption using multi chaotic maps, TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 3, June 2023, pp. 556-565.
64- Image Encryption Based on 2DNA Encoding and Chaotic 2D Logistic Map, Journal of Engineering and Applied Science (2023) 70:60.
65- Object Detection Using Deep Learning Methods: A Review, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 23, No. 2, June 2023.

A- BSC.
1- Theoretical Fundamental of computer organization from 2006 to 2010 in the Department of Computer Science
2- Theoretical Logical design from 2006 to 2013 in the Department of Computer Science
3- Theoretical distributed databases from 2005 to 2006 in the Department of Computer Science.
4- Theoretical Microprocessor from 2014 to 2022 in the Computer Science Department.
5- Theoretical Microprocessor from 2014 to 2022 in the Department of Computer Science
6- Theoretical Computer Architecture from 2014 to 2022 in the Department of Computer Science.
7 - Operating systems theory for the year 2022/2023 in the Computer Engineering Department
8-Logical design laboratory EWB from 2008 to 2013 in the Department of Computer Science.
9-C++ laboratory in the Computer Science Department from 2005 to 2009
10- Matlab laboratory in the Computer Science Department from 2012 to 2014.
11- Oracle Database Laboratory in the Computer Science Department.
12-Professional Access database laboratory in the Computer Science Department.
13- Visual Basic 6 lecturer in the Computer Science Department.
14- Operating Systems, first course and second course, Computer Engineering Department.

B- Postgraduate
1- Decision Support System from 2017 to 2019, Master’s in branch Systems, second course.
2- Multimedia Security from 2019 to 2022, Master’s in branch Security, first Course.
3- Parallel Processing Architecture 2020 to 2021, Master’s in branch General, second course.
4- Cyber Security 2023 Master’s degree in Computer Engineering Department, first course.

Top