Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Random Number Generation for Quantum Key Distribution Systems Based on Shot-Noise Fluctuations in a P-I-N Photodiode
...Show More Authors

A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.

View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayes Estimators With others , for scale parameter and Reliability function of two parameters Frechet distribution
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Numerical Simulation of Metasurface Grating to Function as Polarization Modulator in Quantum Key Distribution Systems
...Show More Authors

Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarize

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Surface area measurements of upper dental cast with different final impressionss
...Show More Authors

Background : surface area anatomy is a proportional point to the retention of complete denture, in past there was no quantitative method to evaluate the surface area, nowadays the size and shape of maxillary arch is measured by different electronically and mathematical devices. A study was therefore, undertaken to measure surface area of upper dental cast that was taken by different final impressions. Materials and methods: twenty patients were examined. All of them had a healthy palate with no singe of injury, trauma, or deformity. Casts were taken by three different final impressions; zinc oxide, additional silicon, and poly ether. And two different devices were used; the computerized one and the Aluminum foil measure. Age, se

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Ieee Transactions On Information Forensics And Security
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers
...Show More Authors

View Publication
Scopus (22)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Adaptive Sliding Mode Controller for Servo Actuator System with Friction
...Show More Authors

This paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Multichannel Optimization With Hybrid Spectral- Entropy Markers for Gender Identification Enhancement of Emotional-Based EEGs
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Analytical Approaches between New Media and Traditional Media
...Show More Authors

The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of common concepts in the field of communication and media. The researcher tries to find an analytical explanation of the relationship between technology by being an influential factor in building the information society, which is the basis of new media, and the technical output that influenced the forms of social relations and linguistic construction as a human communication tool. The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of comm

... Show More
View Publication Preview PDF
Crossref