Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreIn this research, a numerical simulation was conducted to study the behavior of the scouring pattern and the effect of spacing between bridge piers at specified hydraulic conditions such as velocity, depth of flow, and the sediment effective diameter. Moreover, the cross-section shape of piers and their effect on the scouring depth around bridge piers was studied, using Computational Fluid Dynamics (CFD), ANSYS (Fluent) software. A comparison of the simulation results obtained with previous laboratory investigations was done to verify the validity of the numerical model. Generally, the scour pattern using the CFD software gave good agreement with the experimental study. A reversed pro
In this paper, we introduce new conditions to prove that the existence and boundedness of the solution by convergent sequences and convergent series. The theorem of Krasnoselskii, Lebesgue’s dominated convergence theorem and fixed point theorem are used to get some sufficient conditions for the existence of solutions. Furthermore, we get sufficient conditions to guarantee the oscillatory property for all solutions in this class of equations. An illustrative example is included as an application to the main results.
This experimental study demonstrates the gable-reinforced concrete beams’ behavior with several number of openings (six and eight) and posts’ inclination, aimed to find the strength reduction in this type of beam. The major results found are: for the openings extending over similar beam length it is better to increase the number of posts (openings),
Teachers should have acceptable ratios of multiple intelligences. Knowing their most dominate intelligence, teachers will be capable of understanding and considering the multiple intelligences of their students. Accordingly, they will be able to use Gardner’s theory as an effective approach of teaching for all kinds of learners and not limited to a specific type of students especially those who have high ratios of verbal-linguistic and logic-mathematical intelligences
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Introduction: Cerebral hydatid disease (CHD) is rare and the multiple-cystic variety is even rarer. In this paper, we report a case of multiple CHD and explore a possible link with a preceding spontaneous intracerebral haemorrhage (ICH). Case presentation: A 27-year old gentleman with a history of surgically-evacuated, spontaneous ICH presented with severe headache, left-sided weakness - Medical Research Council (MRC) grade II - and recurrent tonic-clonic seizures, while on a full dose of anti-epileptic medication. Brain magnetic resonance imaging (MRI) scans showed multiple intra-axial cystic lesions in the right hemisphere. The cysts were removed intact using Dowling’s technique through a large temporoparietal crani
... Show MoreThis paper introduced an algorithm for lossless image compression to compress natural and medical images. It is based on utilizing various casual fixed predictors of one or two dimension to get rid of the correlation or spatial redundancy embedded between image pixel values then a recursive polynomial model of a linear base is used.
The experimental results of the proposed compression method are promising in terms of preserving the details and the quality of the reconstructed images as well improving the compression ratio as compared with the extracted results of a traditional linear predicting coding system.