Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Planning and implementation of the audit process by using the styles of time management and its impact on the quality of the audit process: Applied Research in the Federal Board of Supreme Audit
...Show More Authors

Witnessing the global arena many changes in the political, economic, social, scientific and technological have left their mark on the world as a whole, these changes require necessarily Advancement of the profession of auditing, and improve their performance, especially after the mixer skepticism the health of approach and the method followed by a check in the major audit firms global view as for the external audit of an active role in providing services to members of the community in various sectors, were to be provide these services to the highest level of quality.To ensure the quality of the audit process to be a proper planning is based on a scientific basis to be the substrate a strong underlying different audit works, and if planni

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Revista De Chimie
Synthesis, Characterization and Biological Evaluation of Cr(III), Fe(III), Co(II), Ni(II), Zn(II) and Cd(II) Complexes Using an Azo Dye as Ligand
...Show More Authors

Azo ligand 11-(4-methoxyphenyl azo)-6-oxo-5,6-dihydro-benzo[4,5] imidazo[1,2-c] quinazoline-9-carboixylic acid was derived from 4-methoxyaniline and 6-oxo-5,6-dihydro-benzo[4,5]imidazo[1,2-c]quinazoline-9-carboxylic acid. The presence of azo dye was identified by elemental analysis and spectroscopic methods (FT-IR and UV-Vis). The compounds formed have been identified by using atomic absorption in flame, FT.IR, UV-Vis spectrometry magnetic susceptibility and conductivity. In order to evaluate the antibacterial efficiency of ligand and its complexes used in this study three species of bacteria were also examined. Ligand and its complexes showed good bacterial efficiencies. From the obtained data, an octahedral geometry was proposed for all p

... Show More
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Experimental Study For a Laminar Natural Convection Heat Transfer From an Isothermal Heated Square Plate With and Without Circular Hole
...Show More Authors

An experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Implementation within strategic planning and its impact on banking service quality: (An applied research on a sample of Iraqi banks)
...Show More Authors

In the midst of rapid changes and difficultiesand the tough competition faced by the Iraqi banks, it has become necessary to focus on a significant aspect of administrative work; that is strategic planning and the key role of implementation within this process in improving the banking service quality. It has emerged as a critical and main competitive weapon for distinguishing the services provided by banks from each other in an effort to participate in increasing market share of the bank in question in question; in its growth, continuation and profit increase.

The research has addressed the relation between the independent variable (implementation within strategic planning), and the dependent variable (banking service quality and

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
مجلة الذكوات البيض
Assessing Accuracy and Interaction in a Speaking Test : AN Analytical study. تقييم الدقة و التفاعل في اختبار المحادثة: دراسة تحليلية
...Show More Authors

This paper deals with one of the most important issues in a foreign language teaching and learning, i.e. speaking test assessment. After giving a survey of literature written on the meaning and definition of a speaking test assessment, two sections have been devoted to tackle the most important issues in this topic. Section one, which is the theoretical part of this paper, sheds light on the basic definitions of the term ‘speaking assessment’ which are, according to the researcher’s point of view, sufficient to cover the area of the study. This section based on applied linguistic theories and researches in order to enhance our understanding of the what is meant by «a speaking test assessment«In addition,it explains the most importan

... Show More
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Euphemism from a Politeness Perspective: An Exploration of the ability of Iraqi EFL learners to Use and Comprehend Euphemistic Expressions
...Show More Authors

Euphemisms are advantageous in people’s social life by turning sensitive into a more acceptable ones so that resentful feelings and embarrassment can be avoided. This study investigates the ability of Iraqi English learners in using euphemistic expressions, meanwhile, raising their awareness and the faculty members in English teaching faculties regarding the relevance of discussing the topics that demand euphemisation. This study comprised three stages: initial test, explicit instruction with activities, and a final test for the students’ development in this domain. A test has been distributed among 50 respondents, who are at the fourth year of their undergraduate study at the University of Babylon/ College of Basic Education. The lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Detection of early occlusal caries of the first permanent molar using different techniques (An in vivo study)
...Show More Authors

Background: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2009
Journal Name
International Journal Of Applied Environmental Sciences
An expert System for Predicting the Effects of Noise Pollution on Grass Trimming Task Using Fuzzy Modeling
...Show More Authors

Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents

... Show More
View Publication Preview PDF