Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
In Iraqi patients with acromegaly the present investigation included 40 control group and 70 patients with acromegaly divided 35 patients with Diabetic while another 35 patients without Diabetic, with ages between (29-72) years for the identification of GST activity polymorphisms by present and absent GSTM1, GSTT1, and PCR-RFLP, enzymatic digestions were carried out using BsmAI (Biolabs. England, UK) for GSTP1b and AciI (Biolabs, England, UK) for GSTP1c.the association GSTActivity with GST genotype were investigated in a cohort of Iraq acromegaly patients comparing with the healthy control group. The results show a non-significant change in GSTP1b gene in both groups, while show high significantly in GSTP1c in diabetic and non-diabetic acro
... Show MoreBackground: Evaluation and measurement of primary stability could be achieved by several methods, including the resonance frequency analysis (RFA) and implant insertion torque (IT) values. The need for a sufficient primary stability, guaranteed by an adequate insertion torque and implant stability quotient values, increased its importance mainly in one stage implants or in immediate loading protocols. The aims of this study was to find if there is a correlation between the peak insertion torque (PIT) and ISQ values of implants inserted in the jaws of different bone quality which regarded as two important clinical determinant factors for prediction of implant primary stability, and to evaluate and compare whether an experienced clinician cou
... Show MoreThis study was attempted to determine optimum conditions, for Glutathione s-Transferase enzyme, in sera of three groups diabetic patients type1 depending on duration of disease without complications compared with control group. The aim of this study was to find optimum conditions were determined such as (pH, Substrate Concentration, Temperature, Incubation time, Enzyme concentration, and effect of(0.15M)(0.25M) of mono divalent compounds). And to find the kinetics parameters in the three groups of diabetic patients when compared with control. It was found optimum pH(8.5,4.5,2.5,6.5).Temperatures(20cº,40cº,50cº,30cº). Incubation times (7min, 4min, 4min, 5min) substrate concentrations (12µl, 10µl, 5µl, 10µl) enzyme concentra
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More