Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe kinetics of removing cadmium from aqueous solutions was studied using a bio-electrochemical reactor with a packed bed rotating cylindrical cathode. The effect of applied voltage, initial concentration of cadmium, cathode rotation speed, and pH on the reaction rate constant (k) was studied. The results showed that the cathodic deposition occurred under the control of mass transfer for all applied voltage values used in this research. Accordingly, the relationship between logarithmic concentration gradient with time can be represented by a first-order kinetic rate equation. It was found that the rate constant (k) depends on the applied voltage, the initial cadmium concentration, the pH and the rotational speed of cathode. It
... Show MorePurpose This study investigated periodontal ligament (PDL) restoration in osseointegrated implants using stem cells. Methods Commercial pure titanium and zirconium oxide (zirconia) were coated with beta-tricalcium phosphate (β-TCP) using a long-pulse Nd:YAG laser (1,064 nm). Isolated bone marrow mesenchymal cells (BMMSCs) from rabbit tibia and femur, isolated PDL stem cells (PDLSCs) from the lower right incisor, and co-cultured BMMSCs and PDLSCs were tested for periostin markers using an immunofluorescent assay. Implants with 3D-engineered tissue were implanted into the lower right central incisors after extraction from rabbits. Forty implants (Ti or zirconia) were subdivided according to the duration of implantation (healing period: 45 o
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe kinetics of nickel removal from aqueous solutions using a bio-electrochemical reactor with a packed bed rotating cylinder cathode was investigated. The effects of applied voltage, initial nickel concentration, the rotation speed of the cathode, and pH on the reaction rate constant (k) were studied. The results showed that the cathodic deposition occurred under mass transfer control for all values of the applied voltage used in this research. Accordingly, the relationship between concentration and time can be represented by a first-order equation. The rate constant was found to be dependent on the applied voltage, initial nickel concentration, pH, and rotation speed. It was increased as the applied voltage increased and decreased as t
... Show More