Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Heat Exchanger Performance by Using Dimpled Tube
...Show More Authors

The enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%.  The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Treatment of Striae Grvidarum as a Type of Striae Distensae Using Long Pulsed Nd:YAG Laser (1064nm) and Fractional CO2 Laser (10600nm)
...Show More Authors

Striae distensae SD or stretch mark are frequent skin lesion that cause considerable aesthetic concern. The 1064nm long pulsed Nd:YAG Laser has been used to promote an increase in dermal collagen and is known to be a Laser that has a high affinity to vascular chromphores. Also by using fractional CO2 Laser 10600nm as an effective modality in treatment of striae distensae SD. It works to stimulate fibroblast and enhance Collagen formation, which is important for newly generated skin tissue.

Objectives: This study aims to verify the efficacy of long pulsed Nd: YAG Laser (1064nm) in the treatment of immature striae distensae (SD) and the efficacy of C02 fractional Laser (10600nm) in treatment o

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fabrication and Characterization of Nanofibers Membranes using Electrospinning Technology for Oil Removal
...Show More Authors

Oily wastewater is one of the most challenging streams to deal with especially if the oil exists in emulsified form. In this study, electrospinning method was used to prepare nanofiberous polyvinylidene fluoride (PVDF) membranes and study their performance in oil removal. Graphene particles were embedded in the electrospun PVDF membrane to enhance the efficiency of the membranes. The prepared membranes were characterized using a scanning electron microscopy (SEM) to verify the graphene stabilization on the surface of the membrane homogeneously; while FTIR was used to detect the functional groups on the membrane surface. The membrane wettability was assessed by measuring the contact angle. The PVDF and PVDF / Graphene membranes efficiency

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
The Media Image of Afghan Women as Reflected by News Websites in 2021: an Analytical Study of Russia Today site
...Show More Authors

International news websites, including Russia Today, pay special attention to the media image of Afghan women, especially after the Taliban movement took control of Afghanistan. Therefore, it was necessary to know the image of the Afghan woman, the fate of the rights she acquired in recent years, and the transformations that affected her after the Taliban took control of the government, and studied them on international news sites, specifically Russia Today.

          The researcher summarized the problem of this study in the following question: What is the media image of the Afghan woman on the Russia Today news site?

         

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Solution of the electromechanical machining problem using the collocation method based on Bernstein polynomials
...Show More Authors

0

View Publication Preview PDF
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Dimensions of binding and non-binding social responsibility and its relationship to organizational performance / Field Study in telecommunications companies in the Republic of yemen
...Show More Authors

The study aims at measuring the dimensions of binding and non-binding social responsibility and its relation to the organizational performance in telecommunication companies in the Republic of Yemen using analytical descriptive approach and questionnaire as a main tool for data collection and comprehensive inventory method.

It has been found  that there is a positive effect and significant moral relation between social responsibility with its binding and non-binding dimensions  and the organizational performance of telecommunication companies in the Republic of Yemen at a level of significance below (0.05). It has also been found that the correlation between the non-binding social responsibilit

... Show More
View Publication Preview PDF
Crossref