Preferred Language
Articles
/
-hi765QBVTCNdQwCyyJ6
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
J. Math. Comput. Sci.
INTERVAL VALUE FUZZY n-FOLD KU-IDEALS OF KU-ALGEBRAS
...Show More Authors

In this paper, we will introduce the concept of interval value fuzzy n-fold KU-ideal in KU-algebras, which is a generalization of interval value fuzzy KU-ideal of KU-algebras and we will obtain few properties that is similar to the properties of interval value fuzzy KU-ideal in KU-algebras, see [8]. Also, we construct some algorithms for folding theory applied to KU-ideals in KU-algebras.

Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of sensory marketing in enhancing the mental image of the customer)Applied research(
...Show More Authors

    The research aims to study the extent of the influence of the dimensions of sensory marketing on the perceptual mental image of customers, knowing the type of relationships that link the dimensions of sensory marketing with each other, no one from the researcher mentioned (as far as the researcher knows) the link between sensory marketing and mental image, from this point of view the main goal is determined, the effect of sensory marketing on the mental image taken from customers, as the research was conducted on a number of first-class restaurants represented (Chef City, Chili House, Mado, Fried Chicken Saj Alreef) and the research community was represented by the customers of the aforementioned restaurants, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 15 2018
Journal Name
International Journal Of Science And Research (ijsr)
Production a Digital Map with the Aid of Total Station and (GIS)
...Show More Authors

Geographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf

... Show More
Preview PDF
Publication Date
Sat Nov 07 2020
Journal Name
Theory And Practice Of Mathematics And Computer Science
Discussion on Bipolar Fuzzy n-fold KU-ideal of KU-algebras
...Show More Authors

Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Role of Tabuk University in Intellectual Education for Students in the Light of the Requirements of Enhancing the Intellectual Security
...Show More Authors

The study aims to identify the degree of Tabuk University practices to raise the intellectual awareness of students through scientific research, as well as to identify the degree of Tabuk University practicing to raise the intellectual awareness through the educational process (faculty member – activities). The study also seeks to identify the degree of Tabuk University practicing to raise the intellectual awareness of students through community service and university media. The study is descriptive in nature that employed the questionnaire as a tool in collecting data. Total of (540) students were chosen randomly from different colleges at universities of Tabuk to form the study sample. The results showed that faculty member has pract

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 25 2015
Journal Name
Arabian Journal Of Geosciences
Fold geometry and kinematics of inversion tectonics for Kosrat anticline, northeastern Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More