Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe study aimed to identify the treatment of the press image of the Great Return Marches in the French international news agency AFP by knowing the most important issues, their direction and the degree of interest in them. The study belongs to the descriptive research, and used the survey method, within the context of the content analysis method, and the researcher relied on the content analysis form tool and the interview tool to collect data. The study population is represented in the photos published by the French News Agency about the Great Return Marches during the period (end of March / 2018 until the end of November / 2019. The researcher chose an intentional sample using the Complete Census method. The study material represented
... Show MoreThe study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
Lowpass spatial filters are adopted to match the noise statistics of the degradation seeking
good quality smoothed images. This study imply different size and shape of smoothing
windows. The study shows that using a window square frame shape gives good quality
smoothing and at the same time preserving a certain level of high frequency components in
comparsion with standard smoothing filters.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThis study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and
... Show MoreThe current research deals with the dialectical relationship resulting from the conflict in the violent combination and construction of the living ( the actor)and the dead (the item) in the structure of the Sinography construction and the emergence of the theatrical play space , which can be summed up by the following question: what is the nature of the dialectical relationship between the living (the actor) and the dead( the item) in the Sinography creation, which limited the research in a central objective : to identify the controversy of the living (actor) and the dead (item) in the performance unit of the theatrical scene . The research, in its objective limits set forth in its methodological framework, analyzes this controversy in o
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More