FACTS


Faculty


Branches


Specializations


Undergraduate Students


Postgraduaet Students

More...     

FACTS


Faculty


Branches


Specializations


Undergraduate Students


Postgraduate Students

More...

 
 

Computer Security Graduation Projects



 

Morning study

No

Project name

Supervisor

Student name

1

Image encryption based on Paillier cryptographic system.

 

د. هاله بهجت

مي صادق

زينب احمد

هبه ماهر

2

Data hiding in digital image using curve fitting technique

د. هاله بهجت

1-عمار حسن

2-محمد صباح

3-احمد عصام

3

Multi chaotic system for image encryption

د. علاء كاظم

بلقيس عبد الحسين

تبارك رياض

نور الهدى علي

4

Encryption Image based on Transposition Block Algorithm with Chaotic Map

 

د. نداء فليح

مريم ضرغام

كرار عادل

3- حسن فلاح

5

Encryption Audio File using Perfect Shuffle Algorithm with Chaotic Map

 

د. نداء فليح

سجاد محمد

حور علي

تبارك قيس

6

Robust Graphical Password By using Image Segmentation

 

د. عبيرطارق

افتخار سعد

زينب كريم

سيف الدين

7

Secure Online Auction System

د. اخلاص خلف

1-سليم كريم

2-حوراء عباس

3-هدى محمود

8

Key generating using artificial intelligent

م. ايناس طارق

علياء حسن

سارة سمير

مصطفى صلاح

9

Enhancement of RC4 algorithm

م. ايناس طارق

حذيفة شكر

فنار ستار

احمد نوفل

10

New Proposed Coding Method for Steganography Purpose

 

د. سهاد مال الله

فاضل عباس

محمد يحيى

محمد سعد

11

Comparison of Several Chaotic Maps Randomization

 

د. احمد طارق

مريم فراس

يوسف رائد

علي عواد

12

Secured design & implementation of Electronic health records

م. ايمان شاكر

ضياء فائق

يوسف جلال

عبدالله احمد

13

An efficient Neural key generation for encryption algorithm

 

م. رشا محمد

مسرة حسن

نبأ خالد

هاجر ياسر

14

Secured e-commerce website

 

م.م غزوة غانم

احمد هيثم

الاء انور

15

Design and implementation secure research archiving system

د. عذراء جاسم

مصطفى سعد

سجاد فاضل

زهراء مهدي

Evening study 

No

Project name

Supervisor

Student name

1

Dynamic stream cipher for protection images and texts information

د. علاء كاظم

ياسر مهدي

عبدالله حمزة

حسن عاصم

2

Image Encryption using A Keyless Approach

د. عبير

مصطفى اياد

غيث مثني

رسل حسن

3

ATM Detail Security Using Image Steganography

د. اخلاص خلف

كرم صفاء

حسن عمار

محمد موفق

4

Ssecured radiation oncology clinic management system

د. اياد حازم

وسام صلاح

مصطفى نتيشة

حسين وضاح

5

Design Entrance System for students using Fingerprint

ا.م علاء نوري

فدك امجد

الحسين نمير

عبد الكريم

6

Text Steganography Method Based On Modified Run Length Encoding

د. سهاد مال الله

مصطفى جمال

افياء حسين

7

Enhance File Encryption Using Hybrid Methods

م. ايمان شاكر

محمود صباح

نور عدنان

ورود احمد

8

SmS APP security system using tiny encryption

م. رشا محمد

عبدالله احمد

يوسف احسان

محمد انور

9

Propose encryption algorithm based on hybrid symmetric and a symmetric encryption algorithm

د. سكينة حسن

سجاد سعد

بكر محمود

زينب علي

10

Email- authentication based on PGP algorithm

د. اقباس عز الدين

نباً محسن

هدى جلال

نهلة اسامة

11

hide secured information in image-based Cover region method

د. اخلاص فالح

عبد الرحمن  حسين

سجاد مهدي

سيف فؤاد

Morning Study 

No

Project name

Supervisor

Student name

1

Encryption WAVE Audio file based on chaotic key

Dr Nida Flaih

Fadi Safaa

Mohammed Khalil

2

Encryption of BMP image using perfect shuffle algorithm

Dr Nida Flaih

Abdoul Kareem A. Mohsen

Mariam Khalifa

3

PSNG Base on mouse movement and chaos theory

90.5

Dr Alaa Kadhim

Sherin S. Kasim

Hadeel Qusai Ibrahim

4

Image encryption base on 2D chaotic theory

Dr Ekhlas Khalaf

Zainab Tariq

Noor Alhuda Habeeb

5

Security Enhancement of Hill cipher

Dr Ekhlas Khalaf

Hasannen Jwad

Ali k.Hanoon

6

Image steganography using discrete wavelet transform

Dr Abdulameer Abdullah

Aya Akram Sadiq

Fatima abdulameer

 

7

Securing ATM details using image steganography

Dr Abeer Tariq

Esraa Shaker salab

Heba Hadeer

8

Hybrid payment security model for e-commerce website

94.5

Dr Abeer Tariq

Bahaa Abdulwahid

Hassan Resaan

9

Design securing APP to manage Beauty Clinics

Dr Ragheed Dawwd

Naba Ali

Shams Abdulrazaq

10

Image steganography using image fusion

Lect Anmar Ali

Lubna Amer

Noha adnan

11

Design and implement a pharmacy management system

 

Lect Anmar Ali

Ali Raad

Sajad Maetham

Evening Study 

No

Project name

Supervisor

Student name

 

Design entrance system for workers using fingerprint

Alaa Nori

Ibrahim Ahmed

Abdulazez Hashim

 

12

Reservation for Airline Tickets by Point of Service (PoS)

Enas Tariq

Haider Mahmood

Mojtaba Hyder

13

Design secure Health Care Web Application for students

Enas Tariq

Ameer Deaa

Kasim Basel

 

14

Enhancement of DES algorithm based on chaotic theory

Eman Shaker

Noor Hameed

Kawther Kabesh

15

Digital watermarking for hiding text image

Eman Shaker

Ahmed Raad

Mohammed Nooreldeen

16

File encryption using multi-dimension Matrix

Manar Mosaab

Ahmed Hassan

Khalil Ibrahim

17

Generate strong password randomly using genetic algorithm

Rasha Mohammed

Zainab Khalil

HayaEsaam

18

Enhance E-banking security using genetic algorithm

Rasha Mohammed

Noor ALzahraa

Zaman Jafaar

19

Protocol Information using data security multi protection

Rasha Mohammed

Zahraa Emad

Wasan Moneer

20

Implementation of Password authentication protocol PAP

Ayad Hazim

Ali Faris

# Project Name Download Supervisor Name Students Names
1 Implementing RC4 Encryption Algorithm in Android Under VB.NET   Dr. Soukaina Hasan Rasul Kareem Hasan Rahma
2 Comparison between 3DES & AES   Lect. Iman Shaker Wasen Ahmed Anas Abdul Hadi
3 Secure Code Generation for UOT Parking Cars   Dr. Bashar Saadon Haider Akram Zaid Nawaf
4 Information Hiding in Webpage   Dr. Ikbas Iz Aldeen Sharaf Aldeen Alaa Iman Fawzi
5 Improve File Encryption by Using Hybrid Method   Dr. Abeer Tariq Ahmed Ataa Malak Muhammed
6 Protection Database From Un Authorization   Dr. Alaa Khadum Thakaa Safaa Zahraa Thamer
7 Arabic Text Steganography   Dr. Abeer Tariq Hasan Ali Saif Raheem
8 Text Steganography Using Con Key   Lect. Suhair Muhammed Noor Aldeen Alaa Aws Ahmed
9 An Enhancement for Block Cipher Method   Asst. Lect. Ammar Fakhri Zainab Muhammed Khitam Muhammed
10 Information Hiding in Digital Audio   Lect. Ikhlas Falih Zahraa Muhammed Rafal Zuhair
11 Substitution Shifting Folding Symmetric Key   Asst. Lect. Farah Tawfeeq Mina Faik Dhuha Talaat
12 Secret Sharing Schema for Image Cryptography   Dr. Iqbas Iz Aldeen Sajad Yassin Duaa Sabah
13 A Proposal to Enhance a Block Cipher   Lect. Inass Tariq Bariq Muqdam  
# Project Name Download Supervisor Name Students Names
1 Image Encryption by Using Block Based Transformation and RC5 Algorithm   Dr. Yousra Hussien Ahmed Mohammed Ali Mohammed
2 Design and Implementation of DES Algorithm Dr. Ikhkas Khalaf Hiba Ali Roaa Musa
3 Develop A New Run Length Coding Algorithm for Image Coding   Dr. Matheel Imad Aldeen Hind Ahmed Alaa Waleed
4 Design and Implementation Pseudo Random Number Generator Using Secret Sharing   Lect. Asst. Muna Ghazi Qamar Laith  
5 Design and Implement Knapsack Cipher   Dr. Soukaina Hasan Ibrahim Malik Mohammed Ali
6 Design and Implement Canny Filter   Dr. Soukaina Hasan Mariam Abdul Hussien Roaa Mohammed
7 New Approach of Serpent Algorithm Dr. Alaa Khadum Alaa Talib Mohammed Abdul Redha
8 Text Hiding in Any Media   Asst. Prof. Alaa Noori Lifiar Salam Israa Yahia
9 Design and Implementation AES Encryption Method   Dr. Abeer Tariq Masaraa Mazin Sara Rasheed
10 Information Hiding by Space Filling Curve   Dr. Rehab Flieh Abdullah Mohammed Mihammed Mustafa
11 Least Significnt Bit Information Hiding Using 2*2 Mask Size   Asst. Lect. Farah Tawfeeq Ahmed Hamza Mustafa Mohammed
12 Secure Watermarking in Audio File   Dr. Bashar Saadon Marwa Ahmed Mustafa Mohammed
# Project Name Download Supervisor Name Students Names
1 Transform a secret message in Smart Phones Using Sticks   Dr. Matheel Imad Aldeen Abdullah Fhadil Riham Zuhair
2 Image encryption Approach using block based Transformation Algorithm   Dr. Yousra Hussien Hawraa Adnan Riam Abass
3 Text Image Based Session Authentication   Dr. Hanaa Mohsen Mahir Hasan Haider Mohsen
4 Implementation of mobile security application   Dr. Rana Fared Rusul Ahmed Shahad Fhadil
5 Using computer to determine the critical path for project Network   Dr. Abdul Mohsen Jabir Mohammed Haqi  
6 Speech to text encryption cryptography techniques by visual studio 2013   Dr. Alaa Khadum Israa Ahmed Qada Ali
7 Various fingerprint enhancements and matching techniques   Lect. Suhair Mohammed Mahaba Faiz Zahraa Khadum
8 Generating a secure label for documents using Bezier cubic splines   Lect. Asst. Anmar Ali Israa Jabur Asal Nazar
9 Improving RSA Encryption Method   Lect. Inass Tariq Muna Fhadil Noor Abdul Hameed
10 Text hiding in digital image   Prof. Asst. Alaa Noori Roqaia Mohammed Dina Jasim
11 Image in image information Hiding   Lect. Ikhlas Falih Sahad Husham Safa Ibrahim
12 Hiding Text in High Energy Region of Digital Image   Dr. Nidaa Flieh Sherihan Ali Rania Saed
13 Steganography in GIS using shape files Dr. Rehab Flieh Gufran Jabbar Alaa Khuder
14 Design and implement access control system for the university of Technology   Dr. Abdul Ameer Abdulah Ahmed Oday Abdul Kareem Munaf
15 Design and Implementation of DES algorithm   Dr. Ikhlas Khalaf Ahmed Ali Karrar Abdullah
16 Voice secure over IP   Lect. Asst. Bashar Saadon Tammam Qutaiba Fhadil Abbas
17 Finger print recognition using N.N.   Dr. Abeer Tariq Ahmed Jasim Ahmed Amer
# Project Name Supervisor Name Students Names
1 E-commerce security using two fish algorithm Lect. Asst. Ikhlas Khalaf Yasamin Waleed Mohammed Karim
2 Image coding using wavelet transform Dr. Matheel Imad Aldeen Noora Jabir Sara Mohsen
3 Secure sending e-mail message with a “form” address from Denail of service attack Lect. Mohemmed Natiq Ibtihal Talib Hadeel Jasim
4 Data mining with Anti viruses Dr. Soukaina Hasan Salah Abdul Rasool Ahmed Adnan
5 Security for Global system for mobile communication - GSM Lect. Asst. Zahraa Abdul Salam Sara Moafaq Mariam Shibeb
6 Image in image information hiding using cover regions and parity bits method Lect. Asst. Ikhlas Falih Mohammed Salih Hiba Abdul Razaq
7 Authentication for speech recognition Dr. Alaa Khadum Jamal Ali Mohammed Fawzi
8 Feature extraction for authentication Lect. Asst. Nuha Jameel Awaz Kareem Sali Adnan
9 Implementing RSA using Baghdad method Dr. Aliaa Kareem Nuha Sabeeh Zainab Alaa
10 Modify DES algorithm using generation digital image Dr. Hala Bahjat Murtada Thair Mohammed Hashim
11 Hiding of data with security using steganography Lect. Asst. Mohammed Ghani Afrah Ali Murtada Khadum
12 Compute data image compression using wavelet transform Lect. Asst. Mohammed Ghani Sinan Salim Adil Abdul Kareem
13 Analyzing and Detecting Information Hiding in Computer Printer Text Lect. Asst. Ragheed Dawod Mazin Mohammed Abbas Talal
14 Hiding Plaintext in Image File Using LSB Method Lect. Asst. Asia Ali Tabarak Zaki Aliaa Abdullah
15 Build System Authorizing or Validity System in Student Database Lect. Asst. Sura Ali Hala Hassan DHuha Dhiaa
16 Hide binary image in RGB image with substitution method Lect. Asst. Noor Mushrek Zaid Abdul Ameer Duaa Fhadil
17 Digital Finger printing for relational data base using VB.net Lect .Asst. Bashar Saadon Mustafa Sattar Hasanen Saed




NEWS AND UPCOMING EVENTS

    Developers              Dept. Media         

Top