Preferred Language
Articles
/
VhZx1YoBVTCNdQwC0qaP
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Iosr Journal Of Computer Engineering (iosr-jce)
A New Approach to DNA, RNA, and Protein Motifs Templates Visualization and Analysis via Compilation Technique
...Show More Authors

Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Retrieval Based on Coefficient Correlation Index
...Show More Authors

Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number. <

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Design of a Differential Chaotic on-off keying communication system
...Show More Authors

Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science &amp; Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Implement an EC-Application Based on Multi Database Environment
...Show More Authors

 The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
 

View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF