Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
The gaps and cracks in an image result from different reasons and affect the images. There are various methods concerning gaps replenishment along with serious efforts and proposed methodologies to eliminate cracks in diverse tendencies. In the current research work a color image white crack in-painting system has been introduced. The proposed inpainting system involved on two algorithms. They are Linear Gaps Filling (LGF) and the Circular Gaps Filling (CGF). The quality of output image depends on several effects such as: pixels tone, the number of pixels in the cracked area and neighborhood of cracked area and the resolution the image. The quality of the output images of two methods (linear method: average Peak Signal to Noise Ratio (PS
... Show MoreIn the current research work, a method to reduce the color levels of the pixels within digital images was proposed. The recent strategy was based on self organization map neural network method (SOM). The efficiency of recent method was compared with the well known logarithmic methods like Floyd-Steinberg (Halftone) dithering and Octtrees (Quadtrees) methods. Experimental results have shown that by adjusting the sampling factor can produce higher-quality images with no much longer run times, or some better quality with shorter running times than existing methods. This observation refutes the repeated neural networks is necessarily slow but have best results. The generated quantization map can be exploited for color image compression, clas
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious. Since image is frequently compressed for storing and transmission, so steganography must counter the variations caused by loss compression algorithm. This paper describes a robust blind image steganography, the proposed method embeds the secret message without altering the quality by spraying theme on the blocks in the high order bits in color channel s
... Show MoreThe synthesis, characterization and liquid crystalline properties of N4,N40-bis((1 H-benzo[d]imidazol-2- yl)methyl)-3,30-dimethyl-[1,10-biphenyl]-4,40-diamine and of their corresponding Mn(II), Fe(II), Ni (II), Cu(II), and Zn(II) complexes are described. The ligand and complexes have been characterized by elemental analysis, magnetic susceptibility measurements (meff), conductometric measurements and Fourier Transform Infrared (FTIR), Nuclear Magnetic Resonance (1H NMR), (13C-NMR) and UV–Vis spectroscopy. Spectral investigations suggested octahedral coordination geometrical arrangement for M(II) complexes. The phase transition temperatures were detected by differential scanning calorimetry (DSC) analysis and the phases are confirmed by op
... Show MoreThis work involves synthesis of novel Schiff bases derivatives contining isoxazoline or pyrazoline units starting with chalcons . 4-Aminoacetophenone was react with pnitrobenzaldehyde or p-chlorobenzaldehyde in basic medium giving chalcones [I]a,b by claisenschemidt reactions. The chalcones [I]a,b were reacted with hydroxylamine hydrochloride giving isoxazolines [II]a,b in basic medium. The chalcone [I]a could also reacted with hydrazine hydrate to give pyrazolines [III]a . The novel Schiff bases with structural formula [VIII]n , [IX]n , [X]m and [XI]m were prepared by the reaction of amino compounds ; isoxazoline [II]a,b and pyrazolines [III]a with monoaldehydes [VI]n and dialdehydes [VII]m , respectively in dry benze
... Show MoreIn this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
The synthesis, characterization and liquid crystalline properties of N4,N40-bis((1 H-benzo[d]imidazol-2- yl)methyl)-3,30-dimethyl-[1,10-biphenyl]-4,40-diamine and of their corresponding Mn(II), Fe(II), Ni (II), Cu(II), and Zn(II) complexes are described. The ligand and complexes have been characterized by elemental analysis, magnetic susceptibility measurements (meff), conductometric measurements and Fourier Transform Infrared (FTIR), Nuclear Magnetic Resonance (1H NMR), (13C-NMR) and UV–Vis spectroscopy. Spectral investigations suggested octahedral coordination geometrical arrangement for M(II) complexes. The phase transition temperatures were detected by differential scanning calorimetry (DSC) analysis and the phases are confirmed by op
... Show More