International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol 17 No 09 (2023) Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System A QR Code Used for Personal Information Based on Multi-Layer Encryption System https://doi.org/10.3991/ijim.v17i09.38777 Haroon Rashid Hammood Al Dallal1(), Wijdan Noaman Marzoog Al Mukhtar2 1 Department Infocommunication Technologies and Communication Systems, Saratov State Technical University, Saratov, Russia 2 Department of Computer Engineering and Information Technology, Razi University, Kermanshah, Iran haroonra1994@gmail.com Abstract—Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended recipient must be trusted with sensitive information and be able to independently authenticate the accuracy of the information by independently checking the specifics. There are several driving the rise in QR codes used for information transmission. Due to their enormous capacity for storing infor- mation, QR codes are vital for dissemination. However, most currently deployed QR code solutions employ insecure data formats and never employ encryption. Secure QR Code is data protection and data concealing available technology. The Quick Response (QR) code is widely used and accessible without extensive tech- nical training. Now, the user data stored in a QR code is effectively public knowledge and occasionally even illegally used. To address the abovementioned issues, this study's authors propose a novel QR code encryption system. Using the image's mathematical processing method, we may apply the equivalence class principle to the ordered equations of the two-dimensional code, producing the desired cryptographic result. This method exploits the unique visual properties of the QR code. Only a QR code reader can decode the code's useful information, which is too complex for standard reading methods. It will be utilised to address issues in speedy business client data protection Security, commodity anticoun- terfeiting, and bicycle sharing QR codes. Keywords—QR code, privacy protection, multi-directional identity authentica- tion, encryption system, image symmetrical processing, data processing 1 Introduction With the growth of the Internet, 4G/5G technology, and business, among other as- pects, smartphones have become an integral part of life for many customers. Addition- ally, an increasing number of people are deciding to travel abroad for vacations and are doing so by making hotel reservations online. It serves a purpose by speeding up the check-in procedure at the front desk, but it also carries a risk because some information 44 http://www.i-jim.org https://doi.org/10.3991/ijim.v17i09.38777 mailto:haroonra1994@gmail.com Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System and personal privacy may be made public[1-3]. There is a greater risk of disclosure because the individual now handles sensitive personal data manually and insecurely. Experts have recommended employing TTJSA and the Advanced Encryption Standard (AES) to obfuscate information and messages in court documents [4-6]. QR barcodes, also known as two-dimensional codes (QR codes), are a type of matrix barcode that uses a black-and-white pattern to encode symbolic data and is dispersed along a lane (the QR direction) using a specific geometry [7]. The system's foundation rests on the binary number system of "0" and "1," and numerous geometric objects with direct cor- respondence to binary systems are utilised to represent numerical data in the text [8]. Automated processing of data is possible with the help of a picture transmitter or a photographic scanning machine. Its high density, vast capacity, and other features make it suitable for usage as a symbol for the number. Evidence from print (including Chinese character files), visual, and other media suggests that QR codes are among the most useful methods for connecting the physical and digital worlds [9]. 2 Literature review In the early nineties, the Japanese automobile industry was the target market for the invention of the QR code. Comparable to barcodes, which use two-dimensional codes to record data about the object they are connected to or related to QR codes are essen- tially visual identifiers by the computer. To store information effectively, a QR code uses four specified coding modes, including numeric, alphanumeric, byte/binary, and kanji (a subset of Chinese characters used in the Japanese language)[10]. Numerous studies on the data hiding technology of QR codes are now being con- ducted. But both nationally and internationally, the majority of techniques involve en- crypting and altering the raw data using cryptographic techniques or analyzing and identifying a massive number of secret keys [7, 11]. The former is not very portable. In the transport industry, individual privacy leakage is a serious issue right now. Large-scale sales are being made of sensitive information from the logistical waybill, including name, address, mobile number, and other details. Fraudsters have access to a lot of private details, which gives them the chance to steal identities and commit fraud. Numerous receivers whose data is compromised incur serious consequences. They can suffer the abuse of useless knowledge or experience fraud [12, 13]. In the study by Dudheria,[14], the available Android secure QR code readers are examined, their security protocols are highlighted, and their effectiveness at spotting malware Or malicious codes is assessed. Numerous QR code readers make the claims to be safe scanners, although investigation shows that this is not the case and that they need to be improved. The paper discusses the potential flaws and restrictions of safe scanning applications and offers suggestions to raise the level of security. Unfortu- nately, the usability of barcode scanners is not taken into account in this study [15]. The cryptographic algorithms of the top 31 Android QR code scanners are examined in the literature by Yao and Shin [16]. Only 2 out of 31 applications offer security alert features, however, extensive testing reveals that phishing and infection threat detection techniques are relatively unreliable. To address this, the researchers suggest SafeQR, a iJIM ‒ Vol. 17, No. 09, 2023 45 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System new QR code reader that relies on two already-existing security APIs: Google safe browsing and Phishtank (Google, site; Phishtank, site). The ability of the scanning to increase the rate at which malicious URLs are discovered is not, unfortunately, sup- ported by any actual data provided by the authors [17]. The authors Wahsheh al., [17] provide a thorough review of the security and privacy concerns relating to QR codes. The data gathered indicate that the majority of reader applications are unable to identify fraudulent URLs. Additionally, by requesting addi- tional rights and obtaining users' private information, these apps breach users' privacy. The study offers design suggestions for practical and safe reader applications and sug- gests a model that uses URL checking and Base64 digital signatures. Results demon- strate that users can be adequately shielded from malicious QR codes byllowing to the design suggestions[17]. Numerous ways to prevent QR code scamming assaults have been suggested; nonetheless, the threat is growing and phishing is now a prevalent method of committing cybercrime [15]. This study develops a plan to protect consumer privacy utilizing RFID technology and multi-layer cryptographic functions. It uses the protection of user private infor- mation in the express logistics industry as its primary research object. The plan can accomplish a dual level of confidentiality for the logistics firm's internal and external customers and it can also guarantee that the person in charge of disclosing personal information will be subject to review [12]. Fig. 1. Express delivery facility procedure of logistics business A QR code phishing detection was suggested by Yao and Shin [16]. They did this by leveraging Google Safe browsing and Phish Tank, two APIs. The research-based solution is superior in terms of user usability and sincere manipulation table, there is no recognition rate, and TP, TN, FP, and FN are mentioned. There is no developed QR code phishing dataset [16]. 46 http://www.i-jim.org Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System Ishihara suggested a temperament detecting system. Work that was not done mainly focuses on QR code production and ignores digital detection system solutions and uses encryption without taking 2014 detect signature and wet usability into account. The content modifications for QR codes [18]. In this study, the researchers suggest a networked hospital management system called CoviReader that securely distributes user data. The IOTA is used to build the application for the users with access to the tangle platform and detailed, immutable, and quick access to their private data. CoviReader manages data, availability of the data, security, and authentication (With important factors to take into account when updating confidential Users engage with IOTA's tangle through a mobile device to exchange data. an application that houses a FIREBASE database. The objective of This brief pa- per will present a functional prototype for evaluating and examining methods for less- ening the effects of the health emergency caused by COVID-19 [19, 20]. Modulation and simulations in OPNET have been used in this research to examine a cloud compu- ting model of a distribution network. By using the experiment, the model is looking into cloud computing to see how well it can be used as a framework for combining satellite communications, data management, and systems for establishing and maintain- ing human trust. The development of a multiple supply chain architecture will be mod- elled, with the modeling approach demanding the combination of data and communi- cations as well as the establishment of human trust and integrity through the developing idea of building trust in multiparty sessions. The OPNET Simulation tool has already been used to generate an early model, and the preliminary findings have been carefully examined. The goals and objectives for this paper have been established thanks to this initial project, which has also assisted in building confidence in designing the much bigger structure of supply chains [21]. The research also doesn't account for the offline risks that come with QR codes, such as SQL and command injections, privacy worries, and usability problems. A bit of string is carried by a QR code, which then transports the string to a database where the information is encrypted. This is the current commer- cial architecture for such services in the domestic market. The user side, or first-level user, is the only one capable of reading the QR code and deciphering the string. The secondary user, or business side, utilises the URL to access the information database. Encrypting the user's information is achieved by utilising the user's personal infor- mation. Said this approach does not encrypt any information. For as long as the database is available, this means that all user information is, in fact, completely public. Multiple types of personal information have been hacked, exposing a serious system security flaw. A novel encryption method is presented in this research. The information included in a QR code image is cut up using the bite rule and the Attribute principle to create a camouflage QR code, which a data reader reads. Key matching can be used to decrypt data encrypted by Terminal and restore it to its original state. If the secret key is to be believed, No matter if the key is private or public, the value of the key determines how the QR code is broken into blocks. The segment's effects are then determined and a baseline for future comparison. One technique to secure a secret key is a paper wallet, simply a piece of paper printed with the private key and a QR code so that the transac- tion may be completed quickly by scanning the paper. iJIM ‒ Vol. 17, No. 09, 2023 47 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System Each group of rectangles assigned the same value consists of four blocks. The size of the segmented m-block isometric quadrilateral is determined by the distance between its location and the circle of the analogous point. The Attribute principle describes this. Whether you're left- or right-handed, the squares will trade positions to form a different picture. The scanning process for two-dimensional codes is omitted from the two-dimen- sional code computing method, which uses the image feature instead. Information is safe, and cryptographic processing times are reduced. 3 Method & data 3.1 Basic structure of QR code 2D barcode is another name for a QR code. Quick Response is the full title of the widely used QR code or QR code. Fig. 2. Simple QR code In recent years, smartphones have increasingly used this encoding technique. Com- pared to the conventional barcode, it can save more Additional data categories can be indicated via information. Fig. 3. "Basic Structure of QR code which is Black & White " 48 http://www.i-jim.org Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System A carefully coded black-and-white image known as a QR code stores data symbol information in a plane (two-dimensional direction) using a certain geometric pattern. The textual mathematical information is represented using a variety of geometric forms that relate to the 1s and 0s, using the idea of "0" and "1" bit which is machine language composing the logic of the inside logic of the computer, which are used to read the image automatically, input method or the photoelectric scanning device. information processing automatically: It shares several characteristics with bar code technology, such as the distinct character sets and check functions that are unique to each coding system. The QR code is created using the pre-propagating data, inserted in the classifi- cation frame, and then an image frame is acquired. The grayscale and median filters used in image preprocessing are applied, and the positive rectangular image is created by identifying the location point. The coding algorithm generates the rectangular pic- ture that is disguised. accomplish the encryption of the QR code. The encrypted, dis- guised QR code picture is placed straight into the recognition frame, where it undergoes " grayscale, median filtering " and other image preprocessing procedures. The decoding algorithm is equivalent to the recognition coding algorithm processes used to disguise the image. Fig. 4. Flow Chart of Encryption Algorithms iJIM ‒ Vol. 17, No. 09, 2023 49 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System Method. It is used to identify and identify the local secret key. Following the corre- spondence of the secret key, the decrypting mode is retrieved and transmitted to the image verification unit to decipher the QR code's upper application logic. According to the findings of this study, the primary QR code area can be divided into equal-sized blocks. The QR code's mapping from analogous points is calculated using these blocks. Recalibration by 2n assignment is a method employed by some protocols, and it is based on the circle distance between the position and effects of the (B) block equip rod quadrilateral. For every group of four identical quadrilaterals, there are eight cubes. As a means of ushering in a new era, the equal rectangle is flipped from its traditional orientation. Fig. 5. Flow chart of signal frequency spectrogram 50 http://www.i-jim.org Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System 4 Analysis and results The technique recognition libraries are used to obtain the decoding mode that corre- sponds to the encrypting mode of the secret image and match the classification key with the encryption key. Fig. 6. The sub sub-bandana rate of the spectrogram In Figure 5, the mathematical formulation used to explain this concept is displayed, and a method of a standard contains is used. The center of the graph is P, and the letters “A, B, C, and D” each occupy four squares; the position of each letter is similar but unique. A, B, C, and D could be randomly selected for data encryption, but various selection process is required to create disguise images. The image is divided into a 4 h 4 matrix in Figure 5, and there are 256 different encryption algorithms available. Fig. 7. The result of Equivalence class principle 4X4 iJIM ‒ Vol. 17, No. 09, 2023 51 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System For each extra row in the matrix, the number of possible schemes grows exponen- tially. For instance, as demonstrated in Figure 7, when the image is split into six h6 matrix, the matrices of encryption techniques rise to 4096. Splitting choice into 2 dif- ferent codes is as easy as a two-value image and tends to infinite. If the computer tries to be decrypted using statistical breaking, the computations will be extremely big. It will be quite challenging to attempt to decrypt the image using a computer. Fig. 8. Extension of Correspondence class value The four clusters of "A1-A4, B1-B4, C1-C4 " and D1-D4 are, accordingly, compa- rable at the picture level, based on the Class Label Principle. A1, B3, C4, and D4 are identified as the multiple user variations among A1-A4, B1-B4, C1-C4, and D1-D4. Each zone is reorganized in the sequence of scanning, as indicated in Figure 6 ,The D4 section is used for reading, and a guideline says it should be read aloud four times (often left- or right-handed). The number of unmerged images can be increased if the image units are only completely joined by using the simple square combining. Fig. 9. The data acquired by scanning a sample QR code 52 http://www.i-jim.org Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System m (m 1)  (2m 1) (1) Equation number one is used to show the rectangular edge unit value that greatly enhances the cost of the violation. Image synthesis analysis can be used to produce multi-layer decryption, and key matching can be used to retrieve encryption information for QR codes. The QR code image can be encrypted multiple times using the built-in private key; if it is the initial layer of encryption, the area will be split immediately. The QR code information is recovered using the appropriate decoding technique. The area of multi-layer disorder is identified if there is multi-layer cryptography. The local disorder is initially repaired in the appropriate decoding mode, and only then is the general restoration carried out. The two-dimensional code encryption system is split into two sections during the actual application process: the producing end and the recognizing end. The two-D- code that needs to be transmitted must be disguised and encrypted by the producing end, and the recognizing end is in charge of decrypting the encrypted 2 D- code2-Dd restoring the 2-D-dimensional code image using the private or public key that was originally es- tablished. It is important to create an algorithm database in preparation, find keys that belong to users of various terminals, and finish decoding by system key matching in order tosh the abovementioned activities. 5 Discussion As seen in Figure 2, a technique is used to create a disguised QR code using the sample information "123456." When you scan the QR code, the incorrect information is displayed, and the interface shown in Figure 8 appears. QR code and read the correct information that are shown the simple issshown3456. Fig. 10. Restore the Qr information iJIM ‒ Vol. 17, No. 09, 2023 53 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System 6 Conclusion In this research paper, a unique QR code cryptography based on the national stand- ard code system is presented and implemented. The combination of image geometric processing with information encryption using QR codes is a novel and useful approach that has a significant impact and great practical value. The need of user needs the algorithm's encryption level can be adjusted flexibly. The basic flexibility is that the two-dimension codes could only include real information that can be read by a specialized scan monitoring system, while the conventional read- ing system can only read the data that has been camouflaged. The technique is intelli- gent, full of variance, and to the maximum capacity matches the variety and non-re- peatability of encryption techniques. With the advancement of the QR code technique, it can be expanded as secondary processing based on the technology. This study intro- duces a new method for using QR codes and the information they convey. It is possible to obfuscate the encryption process to implement multi-layer encryption, increase the size of the method library, use more advanced methods, and make decoding more dif- ficult. How the decoding of picture attributes impacts the covert transmission of data with QR codes is a topic we intend to explore further. Second, we plan to increase the QR code encryption system's functionality by extending it at the application level, cre- ating the necessary mobile operating system, and employing cell phones as the identi- fying end. Additionally, we plan to incorporate local physical data into the next round of development. If the recognition end can receive the secret key through physical in- formation matching rather than the built-in key, it can reduce the production cost and technological barrier. 7 References [1] R. E. Crossler, J. H. Long, T. M. Loraas, and B. S. Trinkle, "Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the inten- tion-behavior gap," Journal of Information Systems, vol. 28, no. 1, pp. 209-226, 2014. https://doi.org/10.2308/isys-50704 [2] H. T. Hazim, "Secure Chaos of 5G Wireless Communication System Based on IOT Appli- cations," International Journal of Online & Biomedical Engineering, vol. 18, no. 12, 2022. https://doi.org/10.3991/ijoe.v18i12.33817 [3] S. Dey, S. Agarwal, and A. Nath, "Confidential encrypted data hiding and retrieval using qr authentication system," in 2013 International Conference on Communication Systems and Network Technologies, 2013: IEEE, pp. 512-517. https://doi.org/10.1109/CSNT.2013.112 [4] H. A. Hassan, "Review Vehicular Ad hoc Networks Security Challenges and Future Tech- nology," Wasit Journal of Computer and Mathematics Science, vol. 1, no. 3, 2022. [5] R. Mohamad, "Data hiding by using AES Algorithm: Data hiding by using AES Algorithm," Wasit Journal of Computer and Mathematics Sciences, vol. 1, no. 4, pp. 112-119, 2022. [6] H. T. Hazim, "Enhanced Data Security of Communication System using Combined Encryp- tion and Steganography," International Journal of Interactive Mobile Technologies, vol. 15, no. 16, pp. 144-157, 2021. https://doi.org/10.3991/ijim.v15i16.24557 [7] M. Xu, L. Lv, J. Zhang, M. Xu, C. Zhang, and J. Zhang, "A New QR Code Multi-layer Encryption System based on Image Geometric Processing," in 2019 IEEE International 54 http://www.i-jim.org https://doi.org/10.2308/isys-50704 https://doi.org/10.3991/ijoe.v18i12.33817 https://doi.org/10.1109/CSNT.2013.112 https://doi.org/10.3991/ijim.v15i16.24557 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System Conference on Mechatronics and Automation (ICMA), 2019: IEEE, pp. 1-5. https://doi.org/ 10.1109/ICMA.2019.8816462 [8] M. A. Khalifa, A. M. Ali, S. A. Alsadai, N. F. Alwan, and G. S. Mahdi, "A Novel Arabic Words Recognition System Using Hyperplane Classifier," Wasit Journal of Computer and Mathematics Sciences, vol. 1, no. 2, pp. 12-20, 2022. [9] Y. Gu and W. Zhang, "QR code recognition based on image processing," in international conference on information science and technology, 2011: IEEE, pp. 733-736. [10] J. Yang, Y. Zhang, and C. J. Lanting, "Exploring the impact of QR codes in authentication protection: A study based on PMT and TPB," Wireless Personal Communications, vol. 96, no. 4, pp. 5315-5334, 2017. https://doi.org/10.1007/s11277-016-3743-5 [11] L. Gong, Q. Zhu, Z. Zhou, and N. Zhou, "Comprehensive design experiment for digital im- age processing based on Matlab," Experimental Technology and Management, vol. 35, no. 11, pp. 48-53, 2018. https://doi.org/10.1201/9781351069205-2 [12] H. Feng, "Application of QR Code Technology in the Design of User Information Privacy Protection Logistics System," International Journal of Frontiers in Engineering Technol- ogy, vol. 3, no. 3, 2021. https://doi.org/10.25236/IJFET.2021.030302 [13] A. S. Hussein, R. S. Khairy, S. M. M. Najeeb, and H. T. ALRikabi, "Credit Card Fraud Detection Using Fuzzy Rough Nearest Neighbor and Sequential Minimal Optimization with Logistic Regression," International Journal of Interactive Mobile Technologies, vol. 15, no. 5, 2021. https://doi.org/10.3991/ijim.v15i05.17173 [14] R. Dudheria, "Evaluating features and effectiveness of secure QR code scanners," in 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Dis- covery (CyberC), 2017: IEEE, pp. 40-49. https://doi.org/10.1109/CyberC.2017.23 [15] S. Subairu, J. Alhassan, S. Abdulhamid, and J. Ojeniyi, "A Review of Detection Methodol- ogies for Quick Response code Phishing Attacks," in 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020: IEEE, pp. 1-5. https://doi.org/10.1109/ ICCIS49240.2020.9257687 [16] H. Yao and D. Shin, "Towards preventing qr code based attacks on android phone using security warnings," in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 341-346. https://doi.org/10.1145/ 2484313.2484357 [17] H. A. Wahsheh and F. L. Luccio, "Evaluating Security, Privacy and Usability Features of QR Code Readers," in ICISSP, 2019, pp. 266-273. https://doi.org/10.5220/0007346202– 660273 [18] T. Ishihara and M. Niimi, "Compatible 2D-code Having tamper detection system with QR- code," in 2014 Tenth International Conference on Intelligent Information Hiding and Mul- timedia Signal Processing, 2014: IEEE, pp. 493-496. https://doi.org/10.1109/IIH- MSP.2014.129 [19] B. Cisneros, J. Ye, C. H. Park, and Y. Kim, "CoviReader: using IOTA and QR code tech- nology to control epidemic diseases across the us," in 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021: IEEE, pp. 0610-0618. https://doi.org/10.1109/CCWC51732.2021.9376093 [20] A. Al-zubidi, R. K. Hasoun, and S. H. Hashim, , "Mobile Application to Detect Covid-19 pandemic by using Classification Techniques: Proposed System," International Journal of Interactive Mobile Technologies, vol. 15, no. 16, pp. 34-51, 2021. https://doi.org/10.3991/ ijim.v15i16.24195 [21] G. Tulemissova, I. Bukenova, and A. Korzhaspayev, "Sharing of teaching staff information via QR-code usage," in Proceedings of The 10th European Conference on Information Sys- tems Management, 2016, p. 195. iJIM ‒ Vol. 17, No. 09, 2023 55 https://doi.org/10.1109/ICMA.2019.8816462 https://doi.org/10.1109/ICMA.2019.8816462 https://doi.org/10.1007/s11277-016-3743-5 https://doi.org/10.1201/9781351069205-2 https://doi.org/10.25236/IJFET.2021.030302 https://doi.org/10.3991/ijim.v15i05.17173 https://doi.org/10.1109/CyberC.2017.23 https://doi.org/10.1109/ICCIS49240.2020.9257687 https://doi.org/10.1109/ICCIS49240.2020.9257687 https://doi.org/10.1145/2484313.2484357 https://doi.org/10.1145/2484313.2484357 https://doi.org/10.5220/0007346202%E2%80%93660273 https://doi.org/10.5220/0007346202%E2%80%93660273 https://doi.org/10.1109/IIH-MSP.2014.129 https://doi.org/10.1109/IIH-MSP.2014.129 https://doi.org/10.1109/CCWC51732.2021.9376093 https://doi.org/10.3991/ijim.v15i16.24195 https://doi.org/10.3991/ijim.v15i16.24195 Paper—A QR Code Used for Personal Information Based on Multi-Layer Encryption System 8 Authors Haroon Rashid Hammood Al Dallal, Bachelor's degree, Department Engineering in Communication Techniques, Al-Furat Al-Awsat Technical University, Najaf, Iraq. Master's degree, Department Infocommunication Technologies and Communication Systems, Saratov State Technical University, Saratov, Russia (email: ha- roonra1994@gmail.com). Wijdan Noaman Marzoog Al Mukhtar, Bachelor's degree, Department Computer Science College of Science for Women, University of Babylon, Babylon, Iraq. Master's degree, Department of Computer Engineering and Information Technology, Razi Uni- versity, Kermanshah, Iran (email: wijdanalmokhtar@gmail.com). Wijdan Noaman Marzoog is an Assistant Lecturer at the University of Babylon / Fac- ulty of Science for Women. I teach computer subject for the first and second stages in the Department of Life Sciences. Article submitted 2023-02-01. Resubmitted 2023-03-27. Final acceptance 2023-03-29. Final version pub- lished as submitted by the authors. 56 http://www.i-jim.org mailto:haroonra1994@gmail.com mailto:haroonra1994@gmail.com mailto:wijdanalmokhtar@gmail.com