Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
The Migration Effect on an Eco-toxicant Model
...Show More Authors

This paper proposes and studies an ecotoxicant system with Lotka-Volterra functional response for predation including prey protective region. The equilibrium points and the stability of this model have been investigated analytically both locally and globally. Finally, numerical simulations and graphical representations have been utilized to support our analytical findings

Scopus (2)
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
An Investigation of Photoconductivity in Indium Antimonide Crystal
...Show More Authors

Various Hall Effects have been successfully observed in samples of n-type indium antimonide with values for conductivity, energy gap, Hall mobility and Hall coefficient all agreeing with theory. A particular interest in developing a method for obtaining accurate values of carrier concentrations in semiconductor samples has been fulfilled with an experimental result of (1.6×1016 cm-3 ±10.7%) giving a percentage difference of (6.7%) to a quoted value of (1.5×1016cm-3) at (77K) using an (80mW C.W. CO2) laser beam at (10.6μm) to illuminate a similar sample of n-type indium antimonide, an "Optical" Hall effect has been observed. Although some doubt has been raised as to the validity of effect i.e. "thermal" rather than "Optical", values o

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 20 2012
Journal Name
International Journal Of Computer And Information Engineering
An Optimal Algorithm for HTML Page Building Process
...Show More Authors

An Optimal Algorithm for HTML Page Building Process

View Publication Preview PDF
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Qarun In the Holy Quran "": An analytical study
...Show More Authors

For in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
An Experimental Analysis of Embankment on Stone Columns
...Show More Authors

When embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
International Journal Of Social Sciences And English Literature
Critical Discourse Analysis of Online Platforms: An Overview
...Show More Authors

The rise of online platforms has transformed the discourse landscape, enabling users to create and share content actively, thereby shaping public perceptions and societal narratives. Understanding the dynamics of this discourse is essential for comprehending its socio-political implications. This review aims to provide a comprehensive overview of Critical Discourse Analysis (CDA) concerning online platforms, exploring how language is utilized across various digital contexts to influence identity formation and social inequalities. Methodologically, the review systematically searches electronic databases, including Google Scholar and ProQuest, using keywords related to CDA and online platforms. A total of 30 relevant studies are purpo

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Achieving an Iraqi model in contemporary fashion design
...Show More Authors

The Iraqi outfit is characterized by special features and identity that are closely related to the traditions, customs, religious and social beliefs and other references of the Iraqi environment and its factors affecting the individual and society. Every place in Iraq has its own uniform, which differs in terms of its artistic, aesthetic and functional components from place to place.

The abaya, especially worn by women, is especially distinct in terms of the design of the uniform, the nature of the cloth made of it, as well as the color of the abaya, which is dominated by black in most designs. The Dar Al-Taros Center and Textile Research initiated the construction of theoretical and practical bases in the design of contemporary

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Jawabu suualat an qawli taqabbalalaaho wal musafahata bahdassalawat
...Show More Authors

This research deals with a jurisprudential manuscript with study and investigation by Sheikh Ibrahim Al-Kurani, one of the prominent Kurdish scholars in the eleventh century. Some claim that it is heresy in the religion, and that the Prophet, may God bless him and grant him peace, did not do it.

The Sheikh responded to that, confirming its permissibility, and that it does not fall within the innovated matters, based on its permissibility on the two Eids and other religious occasions, and also that the issue of supplication with acceptance was legislated for the sake of worship without specifying it to one without the other, and it is known that prayer is one of the greatest acts of worship. supplication that fasting is accepted;

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref