Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Efficient Single Stage Shrinkage Estimator for the Scale parameter of Inverted Gamma Distribution
...Show More Authors

 The present  paper agrees  with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using  suitable  shrinkage weight factor and region.  The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator  are performed .The results are presented in attached tables.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Wed Dec 30 2020
Journal Name
Al-kindy College Medical Journal
The Value of Diffusion Weighted MRI in the Detection and Localization of Prostate Cancer among a Sample of Iraqi Patients
...Show More Authors

Background: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.

Aim of the study:  To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).

Type of the study: a prospective analytic study

Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Interlanguage Pragmatics of Non-Institutional Criticism: A Study of Native and Non-Native Speakers of English
...Show More Authors

Criticism is inherently impolite and a face-threatening act generally leading to conflicts among interlocutors. It is equally challenging for both native and non-native speakers, and needs pre-planning before performing it. The current research examines the production of non-institutional criticism by Iraqi EFL university learners and American native speakers. More specifically, it explores to what extent Iraqi EFL learners and American native speakers vary in (i) performing criticism, (ii) mitigating criticism, and (iii) their pragmatic choices according to the contextual variables of power and distance. To collect data, a discourse-completion task was used to elicit written data from 20 Iraqi EFL learners and 20 American native speaker

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Nonlinear Optical Properties of PMMA Composites Using Z-Scan Technique
...Show More Authors

The nonlinear refractive index and the nonlinear absorption coefficient of unmodified and functional poly(methyl methacrylate) PMMA films were studied before and after the addition of the filler by the z-scan technique, using a Q-switched Nd:YAG laser at two wavelengths: 532 nm and 1064 nm, and at three input energies (13, 33 and 53) mJ. Both linear and nonlinear refractive indices and absorption coefficients of polymer films were studied by using UV-VIS spectrophotometer. The results show that the creation of functional PMMA from unmodified PMMA will increase the nonlinear optical properties in the functional PMMA/copper matrix more than in the unmodified PMMA/copper matrix. Hence, the functional PMMA appears promising as a useful third

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 29 2013
Journal Name
Wireless Personal Communications
A Low Cost Route Optimization Scheme for Cluster-Based Proxy MIPv6 Protocol
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref