Preferred Language
Articles
/
-hi765QBVTCNdQwCyyJ6
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Intuitionistic fuzzy n-fold KU-ideal of KU-algebra
...Show More Authors

In thisˑ paperˑ, we apply the notion ofˑ intuitionisticˑ fuzzyˑ n-fold KU-ideal of KU-algebra. Some types of ideals such as intuitionistic fuzzy KU-ideal, intuitionisticˑ fuzzy closed idealˑ and intuitionistic fuzzy n-fold KU-ideal are studied. Also, the relations between intuitionistic fuzzy n-fold KU-ideal and intuitionistic fuzzy KU-ideal are discussed. Furthermore, aˑ fewˑ results of intuitionisticˑ fuzzyˑ n-ˑfold KU-ideals of a KU-algebra underˑ homomorphismˑ are discussed.

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Mathematica Aeterna
Bipolar fuzzy n-fold KU-ideal of KU-algebras
...Show More Authors

In this paper, we apply the notion of a bipolar fuzzy n-fold KU-ideal of KU- algebras. We introduce the concept of a bipolar fuzzy n-fold KU-ideal and investigate several properties. Also, we give relations between a bipolar fuzzy n- fold KU-ideal and n-fold KU-ideal. The image and the pre-image of bipolar fuzzy n-fold KU-ideals in KU-algebras are defined and how the image and the pre- image of bipolar fuzzy n-fold KU-ideals in KU-algebras become bipolar fuzzy n- fold KU-ideals are studied. Moreover, the product of bipolar fuzzy n-fold KU- ideals in Cartesian product KU-algebras is given.

Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of sensory marketing in enhancing the mental image of the customer)Applied research(
...Show More Authors

    The research aims to study the extent of the influence of the dimensions of sensory marketing on the perceptual mental image of customers, knowing the type of relationships that link the dimensions of sensory marketing with each other, no one from the researcher mentioned (as far as the researcher knows) the link between sensory marketing and mental image, from this point of view the main goal is determined, the effect of sensory marketing on the mental image taken from customers, as the research was conducted on a number of first-class restaurants represented (Chef City, Chili House, Mado, Fried Chicken Saj Alreef) and the research community was represented by the customers of the aforementioned restaurants, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Role of Tabuk University in Intellectual Education for Students in the Light of the Requirements of Enhancing the Intellectual Security
...Show More Authors

The study aims to identify the degree of Tabuk University practices to raise the intellectual awareness of students through scientific research, as well as to identify the degree of Tabuk University practicing to raise the intellectual awareness through the educational process (faculty member – activities). The study also seeks to identify the degree of Tabuk University practicing to raise the intellectual awareness of students through community service and university media. The study is descriptive in nature that employed the questionnaire as a tool in collecting data. Total of (540) students were chosen randomly from different colleges at universities of Tabuk to form the study sample. The results showed that faculty member has pract

... Show More
View Publication Preview PDF