Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
New polymers were prepared from a monomer (5-vinyl-1H-tetrazole), which was prepared from acrylonitrile with sodium azide in the presence of ZnCl2.Another monomer (Methyl acrylate) was also used. Co-monomers were polymerized usingBPO as initiator. The second step was the preparation of copoly acid hydrazide from the reaction of compound2 with hydrazine hydrate, followed by the reaction with carbon disulphide in the presence of KOH to obtain copoly (5-subs.-2-mercapto-1,3,4-thiadiazole). Next,compound4 was reacted with chloroacetyl chloride to yield compound4 5 which was reacted with (hydrazine hydrate , phenyl hydrazine and 2,4-di nitro phenyl hydrazine) as shown in scheme(1). Physical properties of all the prepared copolymers were chara
... Show MoreBackground: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
This paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj
... Show MoreThe solidification process in a multi-tube latent heat energy system is affected by the natural convection and the arrangement of heat exchanger tubes, which changes the buoyancy effect as well. In the current work, the effect of the arrangement of the tubes in a multi-tube heat exchanger was examined during the solidification process with the focus on the natural convection effects inside the phase change material (PCM). The behavior of the system was numerically analyzed using liquid fraction and energy released, as well as temperature, velocity and streamline profiles for different studied cases. The arrangement of the tubes, considering seven pipes in the symmetrical condition, are assumed at different positions in the system, i
... Show MoreGrabisch and Labreuche have recently proposed a generalization of capacities, called the bi-capacities. Recently, a new approach for studying bi-capacities through introducing a notion of ternary-element sets proposed by the author. In this paper, we propose many results such as bipolar Mobius transform, importance index, and interaction index of bi-capacities based on our approach.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More