Preferred Language
Articles
/
BBd0nJABVTCNdQwCO4-x
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.

Scopus
View Publication
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Current Researches On Social Sciences
View Publication
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
on periodic point and chaotic functions

We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace

Crossref
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Constitutional protection of the Human Right Dignity in UAE Law

God Almighty created Man and made him his successor on Earth. He honored him above all other creatures and granted him all means to protect his human dignity, yet to date some societies violate and breach that protection. We are still hearing of the persecution of blacks in the USA and murdering Muslims in foreign countries even though these groups are entitled to the right to human dignity. The right to human dignity is a sacred right that is guaranteed for all individuals regardless of their color, sex, race, religion or origin. The real problem we are facing is that many societies do not provide sufficient protection for this right and do not put penalties and punishment in case this right is violated. There are numerous forms of the

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Bouguer Anomaly Map of Iraq According to a New Local Theoretical Gravity Equation and Its Geological Importance

Four hundred and seventy eight gravity base stations in Iraq were used to obtain a new local theoretical gravity equation. The obtained equation was used to construct a Bouguer anomaly map of Iraq depending on the available gravity base stations. This map was compared with the Bouguer map constructed for the same stations using the international formula (1930). Good similarity in shapes and locations of the anomaly were observed, while the   gravity anomaly values in the new map were increased by about 30 mGal. The eastern zero gravity contour line of the new obtained gravity map coincides with the western  boundary of the tectonic Mesopotamian zone, while the main negative  gravity values coincide with the Mesopotami

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Examination the role of technical information in the development of nursing education for the Faculty of Nursing at the University of Baghdad

Objective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department

... Show More
View Publication Preview PDF
Publication Date
Fri May 29 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Image Fusion Techniques: A Review

Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Scopus Crossref
View Publication