Computer Security Graduation Projects
Morning study |
|||
No |
Project name |
Supervisor |
Student name |
1 |
Image encryption based on Paillier cryptographic system.
|
د. هاله بهجت |
مي صادق زينب احمد هبه ماهر |
2 |
Data hiding in digital image using curve fitting technique |
د. هاله بهجت |
1-عمار حسن 2-محمد صباح 3-احمد عصام |
3 |
Multi chaotic system for image encryption |
د. علاء كاظم |
بلقيس عبد الحسين تبارك رياض نور الهدى علي |
4 |
Encryption Image based on Transposition Block Algorithm with Chaotic Map
|
د. نداء فليح |
مريم ضرغام كرار عادل 3- حسن فلاح |
5 |
Encryption Audio File using Perfect Shuffle Algorithm with Chaotic Map
|
د. نداء فليح |
سجاد محمد حور علي تبارك قيس |
6 |
Robust Graphical Password By using Image Segmentation
|
د. عبيرطارق |
افتخار سعد زينب كريم سيف الدين |
7 |
Secure Online Auction System |
د. اخلاص خلف |
1-سليم كريم 2-حوراء عباس 3-هدى محمود |
8 |
Key generating using artificial intelligent |
م. ايناس طارق |
علياء حسن سارة سمير مصطفى صلاح |
9 |
Enhancement of RC4 algorithm |
م. ايناس طارق |
حذيفة شكر فنار ستار احمد نوفل |
10 |
New Proposed Coding Method for Steganography Purpose
|
د. سهاد مال الله |
فاضل عباس محمد يحيى محمد سعد |
11 |
Comparison of Several Chaotic Maps Randomization
|
د. احمد طارق |
مريم فراس يوسف رائد علي عواد |
12 |
Secured design & implementation of Electronic health records |
م. ايمان شاكر |
ضياء فائق يوسف جلال عبدالله احمد |
13 |
An efficient Neural key generation for encryption algorithm
|
م. رشا محمد |
مسرة حسن نبأ خالد هاجر ياسر |
14 |
Secured e-commerce website
|
م.م غزوة غانم |
احمد هيثم الاء انور |
15 |
Design and implementation secure research archiving system |
د. عذراء جاسم |
مصطفى سعد سجاد فاضل زهراء مهدي |
Evening study |
|||
No |
Project name |
Supervisor |
Student name |
1 |
Dynamic stream cipher for protection images and texts information |
د. علاء كاظم |
ياسر مهدي عبدالله حمزة حسن عاصم |
2 |
Image Encryption using A Keyless Approach |
د. عبير |
مصطفى اياد غيث مثني رسل حسن |
3 |
ATM Detail Security Using Image Steganography |
د. اخلاص خلف |
كرم صفاء حسن عمار محمد موفق |
4 |
Ssecured radiation oncology clinic management system |
د. اياد حازم |
وسام صلاح مصطفى نتيشة حسين وضاح |
5 |
Design Entrance System for students using Fingerprint |
ا.م علاء نوري |
فدك امجد الحسين نمير عبد الكريم |
6 |
Text Steganography Method Based On Modified Run Length Encoding |
د. سهاد مال الله |
مصطفى جمال افياء حسين |
7 |
Enhance File Encryption Using Hybrid Methods |
م. ايمان شاكر |
محمود صباح نور عدنان ورود احمد |
8 |
SmS APP security system using tiny encryption |
م. رشا محمد |
عبدالله احمد يوسف احسان محمد انور |
9 |
Propose encryption algorithm based on hybrid symmetric and a symmetric encryption algorithm |
د. سكينة حسن |
سجاد سعد بكر محمود زينب علي |
10 |
Email- authentication based on PGP algorithm |
د. اقباس عز الدين |
نباً محسن هدى جلال نهلة اسامة |
11 |
hide secured information in image-based Cover region method |
د. اخلاص فالح |
عبد الرحمن حسين سجاد مهدي سيف فؤاد |
Morning Study |
|||
No |
Project name |
Supervisor |
Student name |
1 |
Encryption WAVE Audio file based on chaotic key |
Dr Nida Flaih |
Fadi Safaa Mohammed Khalil |
2 |
Encryption of BMP image using perfect shuffle algorithm |
Dr Nida Flaih |
Abdoul Kareem A. Mohsen Mariam Khalifa |
3 |
PSNG Base on mouse movement and chaos theory 90.5 |
Dr Alaa Kadhim |
Sherin S. Kasim Hadeel Qusai Ibrahim |
4 |
Image encryption base on 2D chaotic theory |
Dr Ekhlas Khalaf |
Zainab Tariq Noor Alhuda Habeeb |
5 |
Security Enhancement of Hill cipher |
Dr Ekhlas Khalaf |
Hasannen Jwad Ali k.Hanoon |
6 |
Image steganography using discrete wavelet transform |
Dr Abdulameer Abdullah |
Aya Akram Sadiq Fatima abdulameer
|
7 |
Securing ATM details using image steganography |
Dr Abeer Tariq |
Esraa Shaker salab Heba Hadeer |
8 |
Hybrid payment security model for e-commerce website 94.5 |
Dr Abeer Tariq |
Bahaa Abdulwahid Hassan Resaan |
9 |
Design securing APP to manage Beauty Clinics |
Dr Ragheed Dawwd |
Naba Ali Shams Abdulrazaq |
10 |
Image steganography using image fusion |
Lect Anmar Ali |
Lubna Amer Noha adnan |
11 |
Design and implement a pharmacy management system
|
Lect Anmar Ali |
Ali Raad Sajad Maetham |
Evening Study |
|||
No |
Project name |
Supervisor |
Student name |
|
Design entrance system for workers using fingerprint |
Alaa Nori |
Ibrahim Ahmed Abdulazez Hashim
|
12 |
Reservation for Airline Tickets by Point of Service (PoS) |
Enas Tariq |
Haider Mahmood Mojtaba Hyder |
13 |
Design secure Health Care Web Application for students |
Enas Tariq |
Ameer Deaa Kasim Basel
|
14 |
Enhancement of DES algorithm based on chaotic theory |
Eman Shaker |
Noor Hameed Kawther Kabesh |
15 |
Digital watermarking for hiding text image |
Eman Shaker |
Ahmed Raad Mohammed Nooreldeen |
16 |
File encryption using multi-dimension Matrix |
Manar Mosaab |
Ahmed Hassan Khalil Ibrahim |
17 |
Generate strong password randomly using genetic algorithm |
Rasha Mohammed |
Zainab Khalil HayaEsaam |
18 |
Enhance E-banking security using genetic algorithm |
Rasha Mohammed |
Noor ALzahraa Zaman Jafaar |
19 |
Protocol Information using data security multi protection |
Rasha Mohammed |
Zahraa Emad Wasan Moneer |
20 |
Implementation of Password authentication protocol PAP |
Ayad Hazim |
Ali Faris |
# | Project Name | Download | Supervisor Name | Students Names | |
1 | Implementing RC4 Encryption Algorithm in Android Under VB.NET | Dr. Soukaina Hasan | Rasul Kareem | Hasan Rahma | |
2 | Comparison between 3DES & AES | Lect. Iman Shaker | Wasen Ahmed | Anas Abdul Hadi | |
3 | Secure Code Generation for UOT Parking Cars | Dr. Bashar Saadon | Haider Akram | Zaid Nawaf | |
4 | Information Hiding in Webpage | Dr. Ikbas Iz Aldeen | Sharaf Aldeen Alaa | Iman Fawzi | |
5 | Improve File Encryption by Using Hybrid Method | Dr. Abeer Tariq | Ahmed Ataa | Malak Muhammed | |
6 | Protection Database From Un Authorization | Dr. Alaa Khadum | Thakaa Safaa | Zahraa Thamer | |
7 | Arabic Text Steganography | Dr. Abeer Tariq | Hasan Ali | Saif Raheem | |
8 | Text Steganography Using Con Key | Lect. Suhair Muhammed | Noor Aldeen Alaa | Aws Ahmed | |
9 | An Enhancement for Block Cipher Method | Asst. Lect. Ammar Fakhri | Zainab Muhammed | Khitam Muhammed | |
10 | Information Hiding in Digital Audio | Lect. Ikhlas Falih | Zahraa Muhammed | Rafal Zuhair | |
11 | Substitution Shifting Folding Symmetric Key | Asst. Lect. Farah Tawfeeq | Mina Faik | Dhuha Talaat | |
12 | Secret Sharing Schema for Image Cryptography | Dr. Iqbas Iz Aldeen | Sajad Yassin | Duaa Sabah | |
13 | A Proposal to Enhance a Block Cipher | Lect. Inass Tariq | Bariq Muqdam |
# | Project Name | Supervisor Name | Students Names | |
1 | E-commerce security using two fish algorithm | Lect. Asst. Ikhlas Khalaf | Yasamin Waleed | Mohammed Karim |
2 | Image coding using wavelet transform | Dr. Matheel Imad Aldeen | Noora Jabir | Sara Mohsen |
3 | Secure sending e-mail message with a “form” address from Denail of service attack | Lect. Mohemmed Natiq | Ibtihal Talib | Hadeel Jasim |
4 | Data mining with Anti viruses | Dr. Soukaina Hasan | Salah Abdul Rasool | Ahmed Adnan |
5 | Security for Global system for mobile communication - GSM | Lect. Asst. Zahraa Abdul Salam | Sara Moafaq | Mariam Shibeb |
6 | Image in image information hiding using cover regions and parity bits method | Lect. Asst. Ikhlas Falih | Mohammed Salih | Hiba Abdul Razaq |
7 | Authentication for speech recognition | Dr. Alaa Khadum | Jamal Ali | Mohammed Fawzi |
8 | Feature extraction for authentication | Lect. Asst. Nuha Jameel | Awaz Kareem | Sali Adnan |
9 | Implementing RSA using Baghdad method | Dr. Aliaa Kareem | Nuha Sabeeh | Zainab Alaa |
10 | Modify DES algorithm using generation digital image | Dr. Hala Bahjat | Murtada Thair | Mohammed Hashim |
11 | Hiding of data with security using steganography | Lect. Asst. Mohammed Ghani | Afrah Ali | Murtada Khadum |
12 | Compute data image compression using wavelet transform | Lect. Asst. Mohammed Ghani | Sinan Salim | Adil Abdul Kareem |
13 | Analyzing and Detecting Information Hiding in Computer Printer Text | Lect. Asst. Ragheed Dawod | Mazin Mohammed | Abbas Talal |
14 | Hiding Plaintext in Image File Using LSB Method | Lect. Asst. Asia Ali | Tabarak Zaki | Aliaa Abdullah |
15 | Build System Authorizing or Validity System in Student Database | Lect. Asst. Sura Ali | Hala Hassan | DHuha Dhiaa |
16 | Hide binary image in RGB image with substitution method | Lect. Asst. Noor Mushrek | Zaid Abdul Ameer | Duaa Fhadil |
17 | Digital Finger printing for relational data base using VB.net | Lect .Asst. Bashar Saadon | Mustafa Sattar | Hasanen Saed |