Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
The Intellectual as an Alien: A Study of Henry James's The Beast in the Jungle and James Joyce's "A Painful Case"
...Show More Authors

This research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
measure the relationship between imported inflation and foreign trade in the Iraqi economy for long 1990-2015 using model nardl
...Show More Authors

The study aims to discuss the relation between imported inflation and international trade of Iraqi economy for the period (1990-2015) by using annual data. To achieve the study aim, statistical and Econometrics methods are used through NARDL model to explain non-linear relation because it’s a model assigned to measure non-linear relations and as we know most economic relations are non-linear, beside explaining positive and negative effects of imported inflation, and to reach the research aim deductive approach was adopted through using descriptive method to describe and determine phenomenon. Beside the inductive approach by g statistical and standard tools to get the standard model explains the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Optimal Classical Continuous Control Quaternary Vector of Quaternary Nonlinear Hyperbolic Boundary Value Problem
...Show More Authors

This work is concerned with studying the optimal classical continuous control quaternary vector problem. It is consisted of; the quaternary nonlinear hyperbolic boundary value problem and the cost functional. At first, the weak form of the quaternary nonlinear hyperbolic boundary value problem is obtained. Then under suitable hypotheses, the existence theorem of a unique state quaternary vector solution for the weak form where the classical continuous control quaternary vector is considered known is stated and demonstrated by employing the method of Galerkin and the compactness theorem. In addition, the continuity operator between the state quaternary vector solution of the weak form and the corresponding classical continuous control qua

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solution of 2nd Order Nonlinear Three-Point Boundary Value Problems By Semi-Analytic Technique
...Show More Authors

    In this paper, we present new algorithm for the solution of the second order nonlinear three-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions which are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series solution that converges very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of three point boundary value problems.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Solution of Nonlinear High Order Multi-Point Boundary Value Problems By Semi-Analytic Technique
...Show More Authors

In this paper, we present new algorithm for the solution of the nonlinear high order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series solution that converges very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of multi- point boundary value problems.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Iterative Solution of Nonlinear Uniformly Continuous Mappings Equation in Arbitrary Real Banach Space
...Show More Authors

 In this paper, we study the convergence theorems of the Modified Ishikawa iterative sequence with mixed errors for the uniformly continuous mappings and solving nonlinear uniformly continuous mappings equation in arbitrary real Banach space.

View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بعض معايير تحديد الرتبة لانموذج الانحدار الذاتي (الطبيعي وغير الطبيعي) من الرتبة الاولـى بأستخدام المحاكـاة
...Show More Authors

The search is contain compared among some order selection criteria  (FPE,AIC,SBC,H-Q) for the Model first order  Autoregressive when the White Noise is follow Normal distribution and some of non Gaussian distributions (Log normal, Exponential and Poisson distribution ) by using Simulation  

 

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 29 2025
Journal Name
Sciences Journal Of Physical Education
المشكلات النفسية المترتبة على جائحة كوفيد 19 لدى طالبات وتدريسيات جامعة بغداد الممارسات وغير الممارسات للرياضة
...Show More Authors

View Publication Preview PDF