Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Fear manufacture in the propaganda discourse image of terrorist ISIS «Daesh» via websites
...Show More Authors

This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Aesthetics of Hybrid Digital Image Technologies in TV Drama: محمد ثائر عدنان البياتي
...Show More Authors

      TV medium derives its formal shape from the technological development taking place in all scientific fields, which are creatively fused in the image of the television, which consists mainly of various visual levels and formations. But by the new decade of the second millennium, the television medium and mainly (drama) became looking for that paradigm shift in the aesthetic formal innovative fields and the advanced expressive performative fields that enable it to develop in treating what was impossible to visualize previously. In the meantime, presenting what is new and innovative in the field of unprecedented and even the familiar objective and intellectual treatments. Thus the TV medium has sought for work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 28 2015
Journal Name
Al-khwarizmi Engineering Journal
Thermal Field Analysis of Oblique Machining Process with Infrared Image for AA6063-T6
...Show More Authors

Abstract

 Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Improving Pre-trained CNN-LSTM Models for Image Captioning with Hyper-Parameter Optimization
...Show More Authors

The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Multimedia Tools And Applications
Boosting Marine Predators Algorithm by Salp Swarm Algorithm for Multilevel Thresholding Image Segmentation
...Show More Authors

View Publication
Scopus (50)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Study the Chemical Bonding of Heterometallic Trinuclear Cluster Containing Cobalt and Ruthenium: [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3] using QTAIM Approach
...Show More Authors

 

The topological parameters of the metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3]1 (Cp* = η5 -C5Me4Et), (Cp = η5 -C5Me5), was explored by using the Quantum Theory of Atoms-in-Molecules (QTAIM). The properties of bond critical points such as the bond delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible than

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Study of Forward Osmosis Using Various Drawing Agent
...Show More Authors

This research was aimed to study the osmotic efficiency of the draw solutions and the factors affecting the performance of forward osmosis process : The draw solutions used were magnesium sulfate hydrate (MgSO4.7H2O) pojtassium chloride (KCL), calcium chloride (CaCl2) and ammonium bicarbonate (NH4HCO3). It was found that water flux increases with increasing draw solution concentration, and feed solution flow rate and decreases with increasing draw solution flow rate and feed solution concentration. And also found that the efficiency of the draw solutions is in the following order:

CaCl2> KCI > NH4HCO3> MgSO4.7H

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref