Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
This study focuses on determining the heterogeneity of Yamama Formation and its spatial distribution in south of Iraq using three indices namely, Coefficient of Variation, Lorenz Coefficient, and Dykstra – Parsons Coefficient. The porosity and permeability values from eleven wells in south of Iraq (Basra and Maysan oil fields) are used for computing heterogeneity indices. Ordinary kriging technique is used to interpolate the computed indices and to show the spatial distribution of these indices over the study area. Results indicated that the average values of Lorenz and Dykstra – Parsons Indices are 0.73 and 0.86, respectively which refer to the extremely heterogeneity nature of Yamama Formation in the study area.The spatial distribu
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreThe present work aimed to synthesize new phenol resins via incorporation of structural modification through introducing new phenolic compounds containing cyclic imide moiety in reaction with formaldehyde. The synthesis of these new resins involved three steps. First, one of the three N-(hydroxyphenyl)tetrabromophtalamic acids 1-3 were processed via a reaction between tetrabromophthalic anhydride and aminophenols. Amic acids 1-3 were dehydrated in the second step by smelting, producing the identical N-(hydroxyphenyl)tetrabromophthalimides 4-6. The new imides represent the new phenolic component
... Show MoreBuzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal instabi
... Show MoreATTAPULGITE clay was modified in this study by the graphene oxide sheets and the clay was diagnosed before and after modification using several techniques (Fourier-transform infrared spectroscopy FT-IR, X-ray powder diffraction XRD, Scanning electron microscope SEM , energy dispersive spectroscopy EDX ) ,The surface of the attapulgite clay (before (Ata) after modification by graphene oxide (Ata-GO) ) was applied to adsorption of the Alizarin dye from its water solutions through the application of several kinetic models (pseudo first-order model , pseudo second -order model , intraparticle diffusion model ),It was found that the practical results follow pseudo second -order model. The process of modification on the surface of the mud has imp
... Show MoreLignin has emerged as a promising asphalt binder modifier due to its sustainable and renewable nature, with the potential to improve flexible pavement performance. This study investigates the use of Soda Lignin Powder (SLP), derived from Pinus wood sawdust via alkaline treatment, as an asphalt modifier to enhance mixture durability. SLP was characterized using Fourier Transformation Infrared Spectroscopy (FTIR), X-ray Diffraction (XRD), and Scanning Electron Microscopy with Energy Dispersive X-ray Analysis (SEM/EDX), revealing significant changes in its chemical structure post-extraction. These analyses showed the presence of phenolic units, including hydroxyphenyl propane, syringyl, and guaiacyl units. The morphology of SLP was identified
... Show More