Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Measuring Dyes Concentration Using a Low-Cost Visible-Light Spectrophotometer
...Show More Authors

   A low-cost, RGB LED-based visible-light spectrophotometer was designed to measure dyes concentration. Dyes are widely used as indicators or coloring agents in different applications and knowing their concentration is an essential part for many studies. The proposed spectrophotometer provides many functionalities that clones the traditional expensive spectrophotometers for a budged price under $50. It was aimed to provide a versatile tool for instructors and educators to teach their students the fundamental concepts behind spectrophotometry. Malachite green, methyl red, and methyl orange dyes were chosen to be good samples to show the integrity of the proposed spectrophotometer in terms of accuracy, repeatability, and sensitivity as

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Using Machine Learning to Control Congestion in SDN: A Review
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 11 2003
Journal Name
Iraqi Journal Of Laser
Microdrop Size Measurement in a Mixing Unit Using Laser Technique
...Show More Authors

One of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Investigating the Influence of Precursor Concentration on the Photodegradation of Methylene Blue using Biosynthesized ZnO from Pometia pinnata Leaf Extracts
...Show More Authors

The ZnO nanoparticles were synthesized at various precursor concentrations i.e. 0.05, 0.1, and 0.5 M by biosynthesis method based on Pometia pinnata Leaf Extracts. Initial nanoparticle concentration influenced the optical bandgap, shape, and structure of nanoparticles. The photodegradation process was carried out under UV illumination. The efficiency of MB degradation was determined by measuring the decrease in MB concentration and by analyzing the optical absorption at 663 nm recorded by UV-Vis spectroscopy. Results showed that the biosynthesized ZnO nanoparticles exhibited efficient photodegradation of MB, with a maximum degradation rate of 80% after 90 minutes of exposure to UV-C light. The study highlights the potential of Pometia pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of governmental consumer spending on the development of the current account balance in Iraq for the period (1990-2014) using ARDL model
...Show More Authors

To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more  imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Gender and Urban Studies as an Interactive Approach and Integrated Curriculum
...Show More Authors

The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and inte

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Evaluating Educational Programs in Combating Indecent Behaviors Among University Students Using Structural Equation Modeling (Field study: Northern Border University)
...Show More Authors

The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of applying the third of basel committee11 conventions(market disciplin) in the efficient of significance components for factors of banking capital risks
...Show More Authors

We have focused the research problem through an assessment of the applicability of the third pillar of the decisions of the Basel Committee 11 (market discipline) or not and its impact on both the adequacy of bank capital, supervisory oversight and banking risks and the statement weaknesses commitment banking institutions and which in turn lead to the stability of the financial system as a whole.                         .
The research is important statement on the importance of big capital in the banking business and the attributes of a role in the absorption of losses suffered by the bank, which reflects the willin

... Show More
View Publication Preview PDF