Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Journal Of The College Of Languages (jcl)
Translating Emotions in Dracula's Horror Fiction into Arabic: A Cognitive Appraisal
...Show More Authors

This paper aims to add to the growing body of cognitive translation studies that deal with the translation of emotions and the factors of evaluating the translation process-oriented. Cognitive appraisal is one of the tokens that includes three paradigms of assessing the performance of translation, it can be addressed from the perspective of emotions, intuitions, and individual styles of the SL and the method of transfer into TL. The study hypothesized that translators create a similar emotional charge due to their mental capability to build the same emotional effect in the TL audience. The study also proposed that the applicability of cognitive appraisal is a valuable method of evaluating the translation process, as pertinent to TPR. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Modified Hybrid Nanoparticles on the Properties of Base Oil
...Show More Authors

 

Nanomaterials have an excellent potential for improving the rheological and tribological properties of lubricating oil. In this study, oleic acid was used to surface-modify nanoparticles to enhance the dispersion and stability of Nanofluid. The surface modification was conducted for inorganic nanoparticles (NPs) TiO₂ and CuO with oleic acid (OA) surfactant, where oleic acid could render the surface of TiO2-CuO hydrophobic. Fourier transform infrared spectroscopy (FTIR), and Scanning electron microscopy (SEM) were used to characterize the surface modification of NPs. The main objective of this study was to investigate the influence of adding modified TiO₂-CuO NPs with weight ratio 1:1 on thermal-physical propertie

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th

... Show More
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Real Time <i>in Situ</i> Remote Monitoring for Cladding Modified SMF Integrating Nanocomposite Based Ammonia Sensors Deploying EDFA
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Sensing Performance of Modified Single Mode Optical Fiber Coated With Nanomaterials-Based Ammonia Sensors Operated in the C-Band
...Show More Authors

View Publication
Scopus (16)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Swarm Intelligence Research
A New Strategy Based on GSABAT to Solve Single Objective Optimization Problem
...Show More Authors

This article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref