Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Digital Photo credibility and its reflection on the cognitive process of journalistic image of Viewers: زيـاد طـارق شـــاكر
...Show More Authors

Represent the current study and tagged (the credibility of digital image and its reflection on the process of cognitive picture releases) scientific effort is designed to detect realizing press releases and the extent affected the credibility of the digital image by selecting the relationship between digital photo and the extent of their credibility on the one hand and between the process of cognition and Press Photo of the hand Other than the consequent establishment researcher collects materials to serve the scientific research topic in three chaptersCombine the first one methodological framework for the search of the research problem and its significance and the desired objective be achieved together with the definition of the most im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using the Sherrod model in predicting financial failure in Iraqi private banks: an applied study in the Iraqi commercial and Iraqi Islamic banks
...Show More Authors

Abstract:

              The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year   . The research examines the use of

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Effect of Partial Coherence illuminated bar on evaluation technique of diffraction image
...Show More Authors

In this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of mi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 03 2001
Journal Name
Master's Thesis
The image of the United States of America in the Iraqi press
...Show More Authors

Preview PDF
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Aesthetic advertising image in the women's magazines covers: ليلى علي رجب العبيدي
...Show More Authors

In life in general and in the press, especially the success of a particular message depends heavily shipments carried by, and images idyllic suggestive, how many meanings that reaching an audience, and is the magazines and one of those media that target a broad audience, trying to please Him and the acquisition of his attention through a form of aesthetic granted pleasure and satisfaction from this point of view, read image ad as Date pure incident of everyday life, and here was placed this research about the aesthetic image advertising in the covers of women's magazines, which has been briefing them through the Four Seasons included in the search, was the first chapter Batarh systematic talked about problem Find the placing on the form

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Image of Women in Arab Media Advertisements: معجب بن عثمان الزهراني
...Show More Authors

Advertisements containing images of women represent one of the most controversial topics of the advertising industry and has an impact on people and trends. This study aims to determine the typical mental image of women purveyed through visual advertising in the Arab media. It also aims to find out whether these advertisements portray women positively or negatively, in addition to investigating the reasons for the recent negative portrayal of women in commercials. The study adopted a descriptive-analytical approach to achieve these objectives. The results indicate that advertising designs that carry images of women displayed in the Arab media create strong mental images. Repetition reinforces these images, and they emphasize the concept

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
Technical image sources In the poetry of Muhammad Salih Bahr al-Ulum
...Show More Authors

يتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 25 2014
Journal Name
Sensors
Minimal Camera Networks for 3D Image Based Modeling of Cultural Heritage Objects
...Show More Authors

View Publication
Scopus (40)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Mon Nov 21 2022
Journal Name
Sensors
Deep Learning-Based Computer-Aided Diagnosis (CAD): Applications for Medical Image Datasets
...Show More Authors

Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes

... Show More
View Publication
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref