Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 13 2020
Journal Name
Nonlinear Engineering
Two meshless methods for solving nonlinear ordinary differential equations in engineering and applied sciences
...Show More Authors
Abstract<p>In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using <italic>Mathematica</italic>® 10. Four applications, which are the well-known nonlinear problems: the magnetohydrodynamic squeezing fluid, the Jeffery-Hamel flow, the straight fin problem and the Falkner-Skan equation are presented and solved using the proposed methods. To ill</p> ... Show More
Scopus (16)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Jun 24 2025
Journal Name
Food And Bioprocess Technology
Classification of Apple Slices Treated by Atmospheric Plasma Jet for Post-harvest Processes Using Image Processing and Convolutional Neural Networks
...Show More Authors
Abstract<p>Apple slice grading is useful in post-harvest operations for sorting, grading, packaging, labeling, processing, storage, transportation, and meeting market demand and consumer preferences. Proper grading of apple slices can help ensure the quality, safety, and marketability of the final products, contributing to the post-harvest operations of the overall success of the apple industry. The article aims to create a convolutional neural network (CNN) model to classify images of apple slices after immersing them in atmospheric plasma at two different pressures (1 and 5 atm) and two different immersion times (3 and again 6 min) once and in filtered water based on the hardness of the slices usin</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
International Communications In Heat And Mass Transfer
Optimization, modeling and accurate prediction of thermal conductivity and dynamic viscosity of stabilized ethylene glycol and water mixture Al 2 O 3 nanofluids by NSGA-II using ANN
...Show More Authors

In this study, multi-objective optimization of nanofluid aluminum oxide in a mixture of water and ethylene glycol (40:60) is studied. In order to reduce viscosity and increase thermal conductivity of nanofluids, NSGA-II algorithm is used to alter the temperature and volume fraction of nanoparticles. Neural network modeling of experimental data is used to obtain the values of viscosity and thermal conductivity on temperature and volume fraction of nanoparticles. In order to evaluate the optimization objective functions, neural network optimization is connected to NSGA-II algorithm and at any time assessment of the fitness function, the neural network model is called. Finally, Pareto Front and the corresponding optimum points are provided and

... Show More
Crossref (118)
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Arab World English Journal
An Assessment of Iraqi EFL Learners’ Performance in Using Synonymy and Antonymy
...Show More Authors

The knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
The Media Image of Afghan Women as Reflected by News Websites in 2021: an Analytical Study of Russia Today site
...Show More Authors

International news websites, including Russia Today, pay special attention to the media image of Afghan women, especially after the Taliban movement took control of Afghanistan. Therefore, it was necessary to know the image of the Afghan woman, the fate of the rights she acquired in recent years, and the transformations that affected her after the Taliban took control of the government, and studied them on international news sites, specifically Russia Today.

          The researcher summarized the problem of this study in the following question: What is the media image of the Afghan woman on the Russia Today news site?

         

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Synthesis and Evaluation of Platinum Nanoparticles Using F. Carica Fruit Extract and Their Antimicrobial Activities
...Show More Authors

Abstract

In this manuscript, a simple new method for the green synthesis of platinum nanoparticles (Pt NPs) utilizing F. carica Fig extract as reducing agent for antimicrobial activities was reported. Simultaneously, the microstructural and morphological features of the synthesized Pt NPs were thoroughly investigated. In particular, the attained Pt NPs exhibited spherical shape with diameter range of 5-30 nm and root mean square of 9.48 nm using Transmission Electron Microscopy (TEM) and Atomic Force Microscopy (AFM), respectively. Additionally, the final product (Pt NPs) was screened as antifungal and antibacterial agent against Candida and Aspergillus species as well as Gram-positive Staphyllococcus aureus and G

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.
...Show More Authors

One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.

The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.

 For data compression, where one is trying to find compact transform representations for a

... Show More
View Publication Preview PDF