Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Sealing Depth of Q-Switched Nd:YAG 1064nm Laser in the Treatment of Patients with Hypersensitive Teeth: An In Vitro Study
...Show More Authors

The purpose of this work was to study the effects of the Nd:YAG laser on exposed dentinal
tubules of human extracted teeth using a scanning electron microscope (SEM). Eighty 2.5mm-thick
slices were cut at the cementoenamel junction from 20 extracted human teeth with an electric saw. A
diamond bur was used to remove the cementum layer to expose the dentinal tubules. Each slice was
sectioned into four equal quadrants and the specimens were randomly divided into four groups (A to D ).
Groups B to D were lased for 2 mins using an Nd:YAG laser at 6 pulses per second at energy outputs of
80 , 100 and 120 mJ. Group A served as control. Under SEM observation, nonlased specimens showed
numerous exposed dentinal tubules. SEM o

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Green synthesis of CdS:Sn NPs by Starch as a Covering Agent and Studying its Physical Properties
...Show More Authors

The aim of this research is to employ starch as a stabilizing and reducing agent in the production of CdS nanoparticles with less environmental risk, easy scaling, stability, economical feasibility, and suitability for large-scale production. Nanoparticles of CdS have been successfully produced by employing starch as a reducing agent in a simple green synthesis technique and then doped with Sn in certain proportions (1%, 2%, 3%, 4%, and 5%).According to the XRD data, the samples were crystallized in a hexagonal pattern, because the average crystal size of pure CdS is 5.6nm and fluctuates in response to the changes in doping concentration 1, 2, 3, 4, 5 %wt Sn, to become   4.8, 3.9, 11.5, 13.1, 9.3 nm respectively. An increase in crystal

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Adaptive Color Image Compression of Hybrid Coding and Inter Differentiation Based Techniques
...Show More Authors

Publication Date
Mon Aug 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Variable length error correcting code for image in OFDM and PAPR reduction
...Show More Authors

Data <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
Globalization and the identity of the mental image structure of urban spaces
...Show More Authors

This research discusses the subject of identity in the urban environment as it attempts to answer a number of questions that come with the concept of identity. The first of these questions: What is identity? Can a definition or conceptual framework be developed for identity? What about individual, collective, cultural, ethnic, political and regional identity? Is there a definition of identity in the urban environment in particular? If there is a definition of identity, what about social mobility responsible for social change? How can we see identity through this kinetics? Can we assume that identity in the urban environment has a variable structure or is of variable shape with a more stable structure? Can we determine the spatial-tempora

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 05 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval

Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Satirical Television Programs and Their Impact on the Image of Iraqi Politicians
...Show More Authors

This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th

... Show More
View Publication Preview PDF
Crossref