Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
International Journal On Interactive Design And Manufacturing (ijidem)
Scopus (30)
Crossref (25)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Performance Evaluation of a Combined Electrocoagulation– Electrooxidation Process for the Treatment of Petroleum Refinery Wastewater
Abstract<p>The present study investigates the application of a combined electrocoagulation-electrooxidation (EC-EO) process for the treatment of wastewater generated from Al-Dewaniya petroleum refinery plant in Iraq. The EC-EO process was examined in terms of its ability to simultaneously produce coagulant and oxidant agents by using a parallel plate configuration system composed of stainless steel plates as cathode and pair of aluminum and graphite plates as anode at two different current concentrations (1.92A/l and 0.96A/l). The results showed that the best conditions for treatment of Al-Dewaniya petroleum refinery wastewater using the combined approach were current concentration of (0.96A/l), current density</p> ... Show More
Crossref (5)
Crossref
View Publication
Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
Scopus (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
A novel fusion-based approach for the classification of packets in wireless body area networks

This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota

... Show More
Scopus Crossref
View Publication
Publication Date
Sat Aug 10 2024
Journal Name
American Journal Of Economics And Business Innovation
Factors Associated with Employees’ Intention to Leave in ICT Sector in Iraq: A Factor Analysis

The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Applied Mathematics
The Dynamics of a Tritrophic Leslie-Gower Food-Web System with the Effect of Fear

The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels

... Show More
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jul 11 2017
Journal Name
The 39th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc'17)
Higuchi fractal dimension of the electroencephalogram as a biomarker for early detection of Alzheimer's disease

It is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s

... Show More
Scopus (44)
Crossref (31)
Scopus Crossref
View Publication
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Human β-Defensin 2 as a Novel Diagnostic Marker of Iraqi Patients with Rheumatoid Arthritis

Rheumatoid arthritis (RA) is an autoimmune disorder of the joints that is characterized by extra-articular involvement in addition to inflammatory arthritis. Joint and periarticular tissue loss brought on by inflammation results in functional impairment. To lessen the significant daily challenges that patients confront and to ensure better outcomes, early detection and treatment are essential. The study's objective was to establish the use of human β-defensin-2 (HBD-2) as a RA diagnostic marker. A total of 60 RA patients and 30 healthy controls participated in the research. The ELISA technique was used to measure serum HBD-2. The following tests were performed: complete blood count (CBC), erythrocyte sedimentation rate (ESR), renal func

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Oct 13 2022
Journal Name
Computation
A Pattern-Recognizer Artificial Neural Network for the Prediction of New Crescent Visibility in Iraq

Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp

... Show More
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Feb 19 2022
Journal Name
Advances In Continuous And Discrete Models
Geometric properties of the meromorphic functions class through special functions associated with a linear operator
Abstract<p>According to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.</p>
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
View Publication Preview PDF