The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brute-force attacks, due to its big key space size and sensitivity to initial values. This algorithm be responsible for a forceful and flexible solution for acquiring secure images, appropriate for high resolution data and real time applications.
Cobalt substituted nickel copper ferrite samples with general formula Ni0.95-xCoxCu0.05Fe2O4, where (x= 0.00, 0.01, 0.02, 0.03, 0.04 and 0.05) were prepared by solid-state reactions method at 1373 K for 4h. The samples prepared were examined by X-ray diffraction (XRD(, atomic force microscope (AFM), Fourier transform infra-red spectroscopy (FTIR) and Vickers hardness. X-ray diffraction patterns confirm the formation of a single phase of cubic spinel structure in all the prepared samples . XRD analysis showed that the increase in the cobalt concentration causes an increase in the lattice constant, bulk density (ρm) and the x-ray density (ρx), whereas porosity (p) and crystallite size (D) decrease. The Topography of the surface observed
... Show MoreThe researcher [1-10] proposed a method for computing the numerical solution to quasi-linear parabolic p.d.e.s using a Chebyshev method. The purpose of this paper is to extend the method to problems with mixed boundary conditions. An error analysis for the linear problem is given and a global element Chebyshev method is described. A comparison of various chebyshev methods is made by applying them to two-point eigenproblems. It is shown by analysis and numerical examples that the approach used to derive the generalized Chebyshev method is comparable, in terms of the accuracy obtained, with existing Chebyshev methods.
Gelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .
In the current study, we investigate the effect of (La) substitution instead of (Cu) on the properties of the superconductor compound (Bi2Sr2Ca2Cu3-xLaxO10+δ) with (x=0,0.05,0.1,0.15,0.2). The samples were prepared by solid state reaction method(SSR). Xray diffraction technique (XRD) was used to estimate the structural properties of the specimens which show an orthorhombic crystalline structure for all the specimens. The results show that the change in ( La) concentration leads to decrease the concentration of (Bi-2223), increment in (Bi-2212 ) and(Bi-2201) with appearance of some impurities. Also decrease the critical temperature(Tc) with the increase
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe design of fabrics and fashion is manifested by aesthetic advantages betting with the movement of society in its quest to develop as an independent art in itself that is linked to the values and aesthetic concepts of other arts and what appears in them of intellectual systems calling for renewal and modernity. Which brought about a wide change in public taste, as well as a desire for innovation . Which made fashion an interesting aesthetic phenomenon and taste is always subject to change constantly to comply with the social variables that occur in human life, as the fashion that appears in a certain era of time and takes a great distance from spreading as something new and out of the ordinary is in fact the fruit of the development of
... Show MoreIn this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between
... Show More