Protection of the digital holy quran using IT techniques /

We have, without doubt, sent down the Message (Quran); and We will assuredly guard it (from corruption). (al-Hijr 15: 9) The Holy Quran is very important not only to Muslims, but to the whole world, because it is the constitution of the life all the time. Today, in the era of electronic revolution...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad, Mohammad Abdulateef
Format: Thesis
Language:English
Published: Kuala Lumpur: Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2014.
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5515
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 039870000a22002770004500
008 140317n2014 my a g m 000 0 eng u
040 |a UIAM  |b eng 
043 |a a-my--- 
050 |a BP130.7 
100 1 |a Ahmad, Mohammad Abdulateef 
245 1 |a Protection of the digital holy quran using IT techniques /  |c by Mohammad Abdulateef Ahmad 
260 |a Kuala Lumpur:   |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,   |c 2014. 
300 |a xvii, 157 leaves :  |b ill. ;  |c 30cm. 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2014. 
504 |a Includes bibliographical references (leaves 151-157). 
520 |a We have, without doubt, sent down the Message (Quran); and We will assuredly guard it (from corruption). (al-Hijr 15: 9) The Holy Quran is very important not only to Muslims, but to the whole world, because it is the constitution of the life all the time. Today, in the era of electronic revolution and information, the subsequent radical changes on the nature of the information, Muslims use computer devices “for ex, laptops, desktops, Galaxy tab and many others” to view and read the digital Holy Quran. Knowing this, then, designing a protection mechanism to protect the digital Holy Quran from any type of modification, tampering and changes is one of the most important and holy task. Thus, it is a demand task to design such a protection methods that verify the safety of all the contents of the digital Holy Quran, and keeping it protected against any changes and counterfeiting intentionally or unintentionally. This thesis defines a protection mechanism called Quran Guardian. The Quran Guardian consists of three new and developed protection methods. The first method is to design a new keyed cryptographic hash function called Gear to verify the data integrity and authenticity of the digital Holy Quran. Gear is a new concrete novel design based on C- Gear block cipher in Davies-Meyer mode. Where, C- Gear applies the wide trail strategy. Also, Gear has two main versions Gear - 256 and Gear -512, with an output length of 256 and 512 bits, respectively. It uses a patched version of Merkle-Damgård, i.e. the wide pipe construction as its mode of operation. Thus, the intermediate chaining value has at least twice larger length than the output hash. We claimed that it is hard to attack Gear with complexities significantly less than brute force. The second method is to develop an encryption method called CARCA. CARCA is Combination between AES and RSA Cryptography Algorithms. The combination between both techniques of cryptography brings the best of each together, the speed of AES encryption and the security of RSA encryption. Working to minimize the disadvantages of both to make the cryptography faster and efficient is our main target. And the third method is to develop a digital watermarking technique called FRAGIE which combines SLSB algorithm and DCT extracting feature. FRAGIE is invisible fragile watermark which embeds in a way so that any modification or attack would cause the watermark destruction. This destruction would work as tampering detection. Doing this, as being the reason to fulfill Allah's promise as in the verse above. 
596 |a 1 
630 |a Qur'an  |x Appreciation 
655 7 |a Theses, IIUm local 
690 |a Dissertations, Academic  |x Kulliyyah of Information and Communication Technology  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Information and Communication Technology 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5515 
900 |a mrd-zhmn 
999 |c 437183  |d 467615 
952 |0 0  |6 T BP 000130.7 M697P 2014  |7 0  |8 THESES  |9 759567  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t BP 130.7 M697P 2014  |p 00011304351  |r 2017-10-17  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF BP 130.7 M697P 2014  |7 0  |8 THESES  |9 852035  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf BP 130.7 M697P 2014  |p 00011304352  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG