Preferred Language
Articles
/
bsj-6382
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Using Landscape analysis techniques to prevent silt accumulation in the reservoir of the Dwerige weir project and developing River basin, Missan, South Eastern IRAQ
...Show More Authors

      Water harvesting techniques developed globally during the last decades with highly increasing water crisis and climate changes. The Yeoman keyline method was spread widely with increased use for sustainable permaculture development. The main aim of the current study is to analyze and solve the siltation problem in Dwerige weir and to develop water resources in the basin area.  The remote sensing data, field surveying, and hydrology are used together to build a new geotechnical approach. The results show that a huge siltation quantity was not considered in the weir design studies, which were represented by sand sheet materials and eroded soils washed by flooding and entering the weir reservoir through four main channels. The t

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Batch and Flow-Injection Spectrophotometric Determination of Procaine HCl in Pharmaceutical Preparations Via Using Diazotization and Coupling Reaction
...Show More Authors

Simple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Applied Science & Technology
The Use of Cubic Bezier Interpolation, Biorthogonal Wavelet and Quadtree Coding to Compress Color Images
...Show More Authors

In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images
...Show More Authors

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Meta Gene
Interleukin-1 single nucleotide polymorphisms and risk of systemic lupus erythematosus among Iraqi patients
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Monitoring Lotic Ecosystem by the Application of Water Quality Index (CCMEWQI)
...Show More Authors

Water Quality Index (WQI) as a tool to assess the water quality status provides advice related to the use of water quality monitoring data and it is a way for combining the complex water quality data into a single value or single statement.The present study was conducted on Al- Hilla river in the middle of Iraq from August 2012 to July 2013 at five selected stations in the river, from Al- Musaib city to Al- Hashimya at the south of Hilla to determine its suitability for aquatic environment (GWQI), drinking water (PWSI) and irrigation (IWQI).This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management, and decision making. According to th

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Analysis and Development of Customer Billing Telephony System
...Show More Authors

The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2023
Journal Name
Journal Of Planner And Development
Beyond Individual Ownership: Women's and Men's Land Tenure Rights in Iraqi Heritage Systems
...Show More Authors

This paper delves into the significant role played by local social and traditional structures in shaping Traditional Community Tenure (TCT) within Iraqi Land Tenure Legislation (ILTR), and examines their impact on gender inequalities, with a specific focus on women's land tenure rights. The methodological approach employed in this study identified the sources of barriers to gender equality within TCT as outlined in ILTR at two different bilateral levels, with input obtained from key stakeholders in a selected city in Iraq. The case study survey encompassed three districts, which served as local layers within the historic sectors of the Iraqi city of Al-Nasiriya. the study employed quantitative methods, including a household surveyو with

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RATE CONSTANT OF SOME AMINO DERIVATIVES DISSOCIATION: RATE CONSTANT OF SOME AMINO DERIVATIVES DISSOCIATION
...Show More Authors

Amino glycoside derivation including, Neomycin, Streptomycin, Kanamycin and Gentamycin with special reagents, which  are  benzoylchloride; benzene sulfonyl chloride and phthalic anhydride were made to enhance Uv-detectability for HPLC analysis. But there are many problems facing pre column derivation and in order to solve this, the conductivity of antibiotic derivatives were used to calculate the dissociation constant and the hydrolysis rate which determined concern type reaction. In addition the  characteristics those controlling the hydrolysis of antibiotic-derivatives were investigated.

View Publication Preview PDF