Preferred Language
Articles
/
MBfcupABVTCNdQwCQpAA
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Global Journal Of Pure And Applied Mathematics
Solution of Modified Kuznetsov Model with Mixed Therapy
...Show More Authors

In this paper two modifications on Kuznetsov model namely on growth rate law and fractional cell kill term are given. Laplace Adomian decomposition method is used to get the solution (volume of the tumor) as a function of time .Stability analysis is applied. For lung cancer the tumor will continue in growing in spite of the treatment.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Experimental Evidence of Chaotic Resonance in Semiconductor Laser
...Show More Authors

In this paper, an experimental study has been conducted regarding the indication of resonance in chaotic semiconductor laser.  Resonant perturbations are effective for harnessing nonlinear oscillators for various applications such as inducing chaos and controlling chaos. Interesting results have been obtained regarding to the effect of the   chaotic resonance by adding the frequency on the systems. The frequency changes nonlinear dynamical system through a critical value, there is a transition from a periodic attractor to a strange attractor. The amplitude has a very relevant impact on the system, resulting in an optimal resonance response for appropriate values related to correlation time. The chaotic system becomes regular under

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 13 2025
Journal Name
Scientific Reports
Optimized image segmentation using an improved reptile search algorithm with Gbest operator for multi-level thresholding
...Show More Authors
Abstract<p>Image segmentation using bi-level thresholds works well for straightforward scenarios; however, dealing with complex images that contain multiple objects or colors presents considerable computational difficulties. Multi-level thresholding is crucial for these situations, but it also introduces a challenging optimization problem. This paper presents an improved Reptile Search Algorithm (RSA) that includes a Gbest operator to enhance its performance. The proposed method determines optimal threshold values for both grayscale and color images, utilizing entropy-based objective functions derived from the Otsu and Kapur techniques. Experiments were carried out on 16 benchmark images, which inclu</p> ... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 26 2021
Journal Name
Journal Of Engineering
Adsorption Desulfurization of Iraqi Light Naphtha Using Metals Modified Activated Carbon
...Show More Authors

The study aims to evaluate the removal of sulfur content from Iraqi light naphtha produced in Al-Dora refinery by adsorption desulfurization DS technique using modified activated carbon MAC loaded with nickel Ni and copper Cu as single binary metals. The experiments were carried in a batch unit with various operating parameters;  MAC dosage, agitation speed, and a contact time of 300 min at constant initial sulfur concentration 155 ppm and temperature. The results showed higher DS% by AC/Ni-Cu (66.45)% at 500 rpm and 1 g dosage than DS (29.03)% by activated carbon AC, increasing MAC dosage, agitation speed, and contact time led to increasing DS% values.  The adsorption capacity of MAC results was recorded (16, 15, and 20) mg sulfu

... Show More
View Publication Preview PDF
Crossref