Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show MoreThe study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreData <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-
... Show MoreAbstract:
This research emerged due to the needs of Iraqi social sector for diagnosing the problems ,finding the appropriate solutions,and exploiting the social opportunities to solve these problems .The research problem focused on raising the following question: "Were Iraqi Managers in the Ministry of Labor and Social Affairs able to use their qualifications as social entrepreneurs in the ministry to improve the quality of life of the disadvantaged groups?", In light of that, the importance and objectives of the study were determined, and this research derives its importance from trying to address social problems by measuring the degree of meeting the subjective and objective needs of the custo
Researches in the field of evaluation of industrial products emotionally are internationally new and non-existing in the Arabic speaking countries, which is considered the crux of the problem in the current research, in addition to the need of the designers and design students to know how to measure the emotional responses for the industrial product in order to get benefit from them in their designs. The research objective is to get a tool that uses emojis in measuring the emotional responses for the products. The researcher designed an emotional verbal wheel and emojis wheel. The sample of the research consisted of (7) chairs different in design and use, and the respondents were (89) students. The most important results are:
1- Desi
Laser skin wound soldering offers many distinct advantages over conventional closure and laser welding techniques. Objective : to compare the histological effects of human skin wound soldering using 50 % human albumin solder and compound charcoal photosensitiser with 980 nm diode laser acting in various modes of action and parameters. Study Design/Materials and Methods: In this in vitro experimental study , Multiple 3-4 cm long full thickness incisions in a specimen of human skin were soldered using a 4 mm spot diameter beam of 980 nm diode laser(at different laser parameters and modes of action) with 50 % human albumin solder mixed with the compound charcoal at 5 % W/V concentration .After obtaining a successful wound soldering , the wo
... Show MoreSix house-hold Abyssinian pumps distributed in different villages of Mansoura (Mans-I, Mans-II and Mans-III) and Talkha (Talk-I, Talk-II and Talk-III) cities, Egypt, have been selected for regular seasonal water quality assessment during 2017. Water samples have been collected within the mid-periods of four seasons Standard assessment tools were employed for the integrated water quality assessment including Water Quality Index (WQI) and ISO standard algal toxicity test. WQI displayed remarkable local and seasonal variations with excellent (≥ 90) and good (70 - 89) only recorded for water samples collected from Mans-I pump located in sparsely populated area and far 50 meters only from the eastern (Damietta) branch of Nile River. WQI of
... Show More