Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Nonlinear optical properties of polymer [PMMA] thin films doped with dye lasing compounds, Rhodamine 6G and Acriflavine in chloroform solvent by using dip coating method
...Show More Authors

The fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Psychological pressure for students who are subject to physical education.
...Show More Authors

The current research involves psychological pressure (educational,environment andemotionly) for secondary level to 2013-2014.This research includes comparison among students who are trained and not trained  in physical education .The sample is(126) students from each gender from first education.Al-Karkh and the research found out that physical education  has an effect in lessing emotional and educational in a big degree in student in secondary  which affect them  positively in their  study.                                     &n

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Journal Of Water Process Engineering
Rational assembly of Z-scheme FeTiO3/Fe-doped g-C3N4 photocatalytic heterojunctions: Photodegradation behavior and mechanism insight
...Show More Authors

Expanded use of antibiotics may increase the ability of pathogenic bacteria to develop antimicrobial resistance. Greater attention must be paid to applying more sustainable techniques for treating wastewater contaminated with antibiotics. Semiconductor photocatalytic processes have proven to be the most effective methods for the degradation of antibiotics. Thus, constructing durable and highly active photocatalytic hybrid materials for the photodegradation of antibiotic pollutants is challenging. Herein, FeTiO3/Fe-doped g-C3N4 (FTO/FCN) heterojunctions were designed with different FTO to FCN ratios by matching the energy level of semiconductors, thereby developing effective direct Z-type heterojunctions. The photodegradation behaviors of th

... Show More
View Publication
Scopus (26)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Feb 17 2026
Journal Name
Journal Of The Iraqi University
THE ROLE OF STRATEGIC AMBIGUITY IN BUILDING THE CUSTOMER’S MENTAL IMAGE: AN EXPLORATORY RESEARCH IN THE NATIONAL INSURANCE COMPANY
...Show More Authors

View Publication
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
2019 International Conference On Automation, Computational And Technology Management (icactm)
Multi-Resolution Hierarchical Structure for Efficient Data Aggregation and Mining of Big Data
...Show More Authors

Big data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (57)
Crossref (12)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Stability of Nonlinear Systems of Fractional Order Differential Equations
...Show More Authors

In this paper, a sufficient condition for stability of a system of nonlinear multi-fractional order differential equations on a finite time interval with an illustrative example, has been presented to demonstrate our result. Also, an idea to extend our result on such system on an infinite time interval is suggested.

View Publication Preview PDF
Crossref