Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Experimental study of nonlinear characterization of hybrid SWCNTs/Ag-NPs fluids, using nonlinear diffraction technique
...Show More Authors

Based on nonlinear self- diffraction technique, the nonlinear optical properties of thin slice of matter can be obtained. Here, nonlinear characterization of nano-fluids consist of hybrid Single Wall Carbon Nanotubes and Silver Nanoparticles (SWCNTs/Ag-NPs) dispersed in acetone at volume fraction of 6x10-6, 9x10-6, 18x10-6 have been investigated experimentally. Therefore, CW DPSS laser at 473 nm focused into a quartz cuvette contains the previous nano-fluid was utilized. The number of diffraction ring patterns (N) has been counted using Charge - Coupled- Device (CCD) camera and Pc with a certain software, in order to find the maximum change of refractive index ( of fluids. Our result show that the fraction volume of 18x10-6 is more nonli

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
مجلة كلية العلوم الاسلامية جامعة بغداد
Secret baptisms among Christian denominations, descriptive study
...Show More Authors

Christian rites and rituals to be performed, not abandon them, and they see it as a sacred duty in Christ's (as) followers, including: (secret baptisms among Christian denominations, descriptive study) baptisms in the Christian Mystery of God of the mysteries of the Church, every Christian must be baptized always resented It was alaimanh, the Guide mentioned in the Bible by Jesus to his disciples ((just go make disciples of all Nations and immersed them in the name of the father and of the son and of the Holy Spirit, teaching them to observe all that I advised you, and here I am with you all days to the end of the age))( And be baptized in the name of the father and the son and the Holy Spirit, and that's what makes this practice through th

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs
...Show More Authors
Abstract<p>Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Building an Analytical Method to Study Cantilever Beam Dynamic Response
...Show More Authors

Cantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successful

... Show More
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (7)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Image data compression by using multiwavelete for color image
...Show More Authors

There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja

View Publication Preview PDF