Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (54)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Factores lingüísticos y extralingüísticos de la evolución semántica de los términos Linguistic and non-linguistic factors of the semantic evolution of terms
...Show More Authors

La disciplina sémantica siendo una rama de la lingüística y relacionada con los significados que residen detrás de los vocablos sería muy intereseante ser estudiada y investigada, sobre todo cuando tratamos de penetrarnos dentro de la evolución semántica y los motivos por los que se suceden estos cambios. Pues, es injusto dejar de dar una definición aclaratoria sobre esta disciplina y sus componentes.

El significado de los léxicos que se forma por un conjunto de semas o rasgos significativos mínimos. Sin embargo, no todos esos semas son igualmente intervenidos por los hablantes de una comunidad lingüística, sino que hay algunos de ellos que siempre están presentes, mientras que otros varían. Es decir, el significado

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Arab Journal Of Basic And Applied Sciences
Analytic and numerical solutions for linear and nonlinear multidimensional wave equations
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Iraq's Image in the British Press An analytical study of the Guardian and The Daily Telegraph for 1 / 1- 31/3/2019: Research extracted from a master's thesis
...Show More Authors

The topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Perceptual for enrolled and not enrolled the puplis in kindergartens (comparative study)
...Show More Authors

Enrollment in kindergarten child accomplishes many positive aspects, that’s what Im sure a lot of modern educational trends in child education preschool in the importance of exposing children to a variety of sensory stimuli that contribute to impart a range of sound concepts.

Current research aims to know:

1.the level of sensory perception in the first primary grade students a sample search.

2.differences in perception of elementary first-graders with variable gender male, female))   3.differences in perception of the first primary grade students attending and not attending kindergarten in accordance with variable attendance (attending, not attending).

school students (first grade) from attendi

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
The The Application of Virtual Reality to (Mechatronics Engineering) by Creating an Articulated Robotic Work Cell Using EON Reality V9.22.24.24477
...Show More Authors

Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope.  The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare some wavelet estimators for parameters in the linear regression model with errors follows ARFIMA model.
...Show More Authors

The aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 15 2025
Journal Name
Baghdad Science Journal
Hydrothermal synthesis of high surface area mesoporous silica as an efficient adsorbent for removal of crystal violet dye from aqueous solution
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref