Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
An Investigation Study of Thinning Distribution in Single Point Incremental Forming Using FEM Analysis
...Show More Authors

Single Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.

This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p

... Show More
View Publication Preview PDF
Publication Date
Wed May 20 2026
Journal Name
Modern Sport
The effect of Developing special endurance using multiple round periods on some physical and functional indicators for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (42)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internet banking services and their impact on customer's: Applied Research on Sample of Iraqi Commercial Banks
...Show More Authors

This research examines the issue of Internet banking services and their impact on customer's perceived value to know the potential of Iraqi commercial Banks to provide Internet banking services as well as determine the customer's level of perception of the value of such services. The research aims to demonstrate the effect that Internet banking services have on the customer's perceived value and to find how online banking services can be used to add value that the customer perceive. The main findings were that research sample banks don't have a sophisticated network of electronic Windows through which banking services are provided to allow customers to manage their accounts, and perform various operational operations through the

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
The Performance of the Actor (Sami Abdul-Hameed) in the Picturesque Theatre of the play Director (Salah AL-Kassab)
...Show More Authors

The researches discusses the style of acting used by (Sami Abdul-Hameed) in one of the play director (Salah AL-Kassab) production whine he called; Picturesque.
The problem of this research is to discover the differences between the performance of (Sami Abdul-Hameed) in the Picturesque Theatre and the other theatre.
The goal of the research is to get to know the style of acting used in (king Lear) directed by (Salah AL-Kassab).
After defining the term (picturesque theatre), the researcher discusses the elements of the Visual theatre and the components of the stage picture according to (Alexander Dean) and he refers to those well-known director who had emphasized the Visual elements. Such as (Gordon Grieg) and (Franco Zeferrel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF