Preferred Language
Articles
/
ExYh9osBVTCNdQwC--f7
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.

Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Sep 01 2019
Journal Name
Al Adab
Cognitive Stylistic Analysis of Daily Yahoo Storie
...Show More Authors

Cognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig

... Show More
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Big Data applications in forecasting corporate bankruptcy: Field analysis in the Saudi Business Environment
...Show More Authors

This study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
The Effect of Classification Methods on Facial Emotion Recognition ‎Accuracy
...Show More Authors

The interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
The Role of Transition of Workforce between Companies in Transferring Technology
...Show More Authors

The transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif

... Show More
View Publication Preview PDF
Publication Date
Fri May 18 2018
Journal Name
International Journal Of Advanced Biological Research
CALCULATION THE AIR POLLUTION TOLERANCE INDEX OF EUCALYPTUS PLANT IN BAGHDAD CITY
...Show More Authors

Air pollution from various sources is one of the most serious environmental problems, especially after pollutants are deposited on the surface of the soil and leaves of the plants and then transferred to the rest of the plant and entering food chains. The present study was conducted to determine the effects of air pollution on different biochemical parameters in Eucalyptus sp. and calculation the Air Pollution Tolerance Index. The selected plant leaves were collected from five sites, four of them within the city of Baghdad, namely Al-Jadriya, Al-Andlous, Al-Doura and close to the private generators to represent the urban areas and Abu Ghraib site to represent the rural area. The leaves were taken on a seasonal basis for the period from Octo

... Show More
Publication Date
Wed Apr 03 2024
Journal Name
International Journal Of Ebusiness And Egovernment Studies
THE IMPACT OF STRATEGIC CONSENSUS ON ORGANIZATIONAL PERFORMANCE BY MEDIATING STRATEGIC ALIGNMENT
...Show More Authors

This study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis

... Show More
Scopus (2)
Scopus