Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Psychological pressure for students who are subject to physical education.
...Show More Authors

The current research involves psychological pressure (educational,environment andemotionly) for secondary level to 2013-2014.This research includes comparison among students who are trained and not trained  in physical education .The sample is(126) students from each gender from first education.Al-Karkh and the research found out that physical education  has an effect in lessing emotional and educational in a big degree in student in secondary  which affect them  positively in their  study.                                     &n

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization
...Show More Authors

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus
Publication Date
Wed May 01 2024
Journal Name
Journal Of Water Process Engineering
Rational assembly of Z-scheme FeTiO3/Fe-doped g-C3N4 photocatalytic heterojunctions: Photodegradation behavior and mechanism insight
...Show More Authors

Expanded use of antibiotics may increase the ability of pathogenic bacteria to develop antimicrobial resistance. Greater attention must be paid to applying more sustainable techniques for treating wastewater contaminated with antibiotics. Semiconductor photocatalytic processes have proven to be the most effective methods for the degradation of antibiotics. Thus, constructing durable and highly active photocatalytic hybrid materials for the photodegradation of antibiotic pollutants is challenging. Herein, FeTiO3/Fe-doped g-C3N4 (FTO/FCN) heterojunctions were designed with different FTO to FCN ratios by matching the energy level of semiconductors, thereby developing effective direct Z-type heterojunctions. The photodegradation behaviors of th

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Journal Of The Iraqi University
THE ROLE OF STRATEGIC AMBIGUITY IN BUILDING THE CUSTOMER’S MENTAL IMAGE: AN EXPLORATORY RESEARCH IN THE NATIONAL INSURANCE COMPANY
...Show More Authors

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
A Tile with Nested Chain Abacus
...Show More Authors

This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Small Horizontal Wind Turbine Design and Aerodynamic Analysis Using Q-Blade Software
...Show More Authors

Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Fme Transactions
Unsteady nonlinear panel method with mixed boundary conditions
...Show More Authors

A new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref