Preferred Language
Articles
/
42G3EJkBdMdGkNqjDRJj
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
E-Learning (Benefits and management systems)
...Show More Authors

E-learning seeks to create an interactive learning environment between the teacher and the learner through electronic media conveying in more than one direction, regardless of how the environment and its variables are identified. It also develops skills necessary to deal with technology in order to be able to take into account the individual differences between them and helps e-learning teacher and learner to achieve the goals set in advance and identify educational objectives in a clear manner. The research aims to identify e-learning in its benefits and management systems. It has three sections dealt with in the current research. Chapter II concentrates on the research Methodology, which consisted of three sections: The first s

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 1996
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NOTES ON SCOLECOPHIDIANS (BLIND SNARES) REPT1LIA SERPENTES, OF IRAQ
...Show More Authors

This work includes the geographical distribution variation and notes for the habitat of Iraqi blind snakes Leptotyphlops macrorhynehus. Typhlops braminus, and Typhlops vermicularis. A key was also given for the identification of these three snakes.

View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (8)
Scopus
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref