Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreUropathogenic specific protein is a genotoxic protein targeting the DNA, leading to mutations and modifications in the normal cell's DNA and subsequently, cancer development. This study aims to determine the prevalence of the usp gene in Uropathogenic Escherichia coli isolated from females with urinary tract infections and study its correlation with biofilm formation. One hundred and five urine specimens were collected from female patients (20 to 55 years old) with urinary tract infections attending hospitals. Traditional laboratory methods using selective and differential culture media were used for initial bacterial isolation and identification, and molecular techniques that targeted a segment of the 16SrRNA gene with a specific primer pa
... Show MoreBackground: Head and neck squamous cell carcinoma is the sixth most common cancer world wide. Despite greater emphasis on multi-modality therapy including surgery, radiation and chemotherapy, advanced stage head and neck squamous cell carcinoma continues to have poor 5-year survival rates (0-40%) that have not significantly improved in the last (30) years. To improve outcomes for this deadly disease , It is required a better understanding of the mechanisms underlying head and neck squamous cell carcinoma tumor growth, metastasis, and treatment resistance. This study evaluates the Immunohistochemical expression of E-cadherin and CD44 adhesion molecules in OSCC and to correlate the expression of either marker with each other, with lymph node
... Show MoreThe present study was aimed to find out the role of humoral immunity in the pathogenesis of psoriasis. Complements C3, C4 and immunoglobulin IgE .The study included 55 Iraqi patients with psoriasis 30 (15 females ,15 males) were untreated with any drugs. The other patient group consisted of 25 (9 female and 16 male) treated with a biological treatment (infliximab) ,and 30 (13 males ,12 females) healthy control group. Blood sample were withdrawn (5) ml of venous blood for both patients and members of the control ,to conduct the Immunological tests to determine the quantitative for each of total IgE by using (ELISA) and C3,C4 by Single Radial Immunodiffuse (SIRD). The results showed significant increase in the level of probability (P <0.0
... Show MoreThis study examines the monthly mean diurnal variations of the ionospheric sporadic E (Es) layer’s critical frequency (
Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show More