Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
When we try to navigate the experiment in search of the repressed and to find the dream of creativity by changing the modularity of the presentation, and the relationship of the characters with the rest of the elements according to a visual vision that reflects the product of the presentation system through the formation of visions and ideas within the textual structure.
We find that the expression of the theatrical act may need to exclude narrative dialogues and turn them into a tangible visual language. Physical and visual expression, and movement review, thus producing a “picture language” through which it is possible to form a new vision, and this is called (image theater), which translates the language of dialogue through lig
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreMedia plays an important role in shaping the mental image of their audiences for individuals, groups and organizations, States and peoples. It is the window through which overlooks the masses on events and issues, and in the light of their exposure to these means are their opinions and impressions.
Despite the importance of direct experiences in shaping opinions, drawing pictures and impressions, it is inevitable to rely on these means as individuals can not engage in direct experiences with thousands of events, issues and topics that concern their community and other societies.
There is no doubt that media is of great importance at the present time, because of its significant impact in the management of the course of pol
... Show Morerepresent websites link support of human communicate and cohesion of cultures different depending on their languages and their environments around, it was the evolution of one of the most important means of communication of services for electronic networks, the Internet active role in containing the world Bbodqh science and knowledge to Taatlaqah cultures from which derives its intellectual and cognitive cupboards continuity and as a link language for each those environmental Altdadat, linguistic, religious, political, economic . We all know that these electronic means difficult promise ring intellectual and mental connectivity for the masses polarized without being of the image as an element Kravekaa supporter of the electronic media an
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreIn life in general and in the press, especially the success of a particular message depends heavily shipments carried by, and images idyllic suggestive, how many meanings that reaching an audience, and is the magazines and one of those media that target a broad audience, trying to please Him and the acquisition of his attention through a form of aesthetic granted pleasure and satisfaction from this point of view, read image ad as Date pure incident of everyday life, and here was placed this research about the aesthetic image advertising in the covers of women's magazines, which has been briefing them through the Four Seasons included in the search, was the first chapter Batarh systematic talked about problem Find the placing on the form
... Show MoreWe studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.
We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:
-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.
-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia
... Show MoreThe study problem is about the role of Shaqra University in building the mental image of the Kingdom’s 2030 vision among its female students. The study aims to examine the university’s role in providing information about the Kingdom’s 2030 vision, its role in shaping the vision’s image, the university’s role in the behavioral aspect of the vision, along with studying the extent of differences in answers of the sample individuals towards the study themes attributed to the personal variables. The researcher adopted the descriptive survey method. A sample of (1399) female students was used to achieve the study objectives. The results showed that university’s role in building the mental image of the Kingdom’s 2030 vision, among
... Show More