Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re
... Show MoreAbstract
This study turns about The Military Thinking and His Islamic balance in
The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar
(God be pleased on him )The military field is very wide in all intellectual and
practically effects at The Caliph Ali Bin Abi Taleb(peace is on him ). Its
considered the first seed for islam ,therefore,there are a lot from military
situtions which proved his practical experience in these affairs , and away
from the details of war and practical battles lets search the sample and the
academic study for fair military thinking (justice) in The Compact of Caliph Ali
to Malek Al Ashtar when he became the ruler of egypt.
The military fair thinking determines fr
The study aimed to identify the use of the electronic concept maps method in learning some of the skills of the floor exercises in the artistic gymnastics for third graders ,as well as to identify the best group between the two research groups (experimental And the officer to learn and retain some of the skills of the floor exercises in the artistic gymnastics of the research subject , and the experimental method was used and included the sample research on students of the collage of Physical Education and Sports Sciences/University of Baghdad, third grade, and has selected (10) Students for each group of The experimental and controlling groups randomly by lottery and after the completion of the period of implementation of the experiment wh
... Show MoreIn the tenth century, Turks began to convert into Islam and adopted for official and literary use the Arabic language to study the teachings of the new religion they believed in. The use of many of the loanwords have become absolute in the Ottoman period, but even in Modern Turkish a large number of loanwords from Arabic can be often recognized because they are not subject to the strict rules of Turkish. Yet, some of these words lost its original meaning and acquired new different Turkish meaning. Moreover, some of the Arabic nouns of singular form in Turkish, modified the plural Turkish form. The present study entitled “the adaptation and the different modifications of borrowed Arabic Plurals in Modern Turkish” sheds light on
... Show MoreLas formas verbales: el infinitivo, el gerundio y el participio, son derivados verbales que se comportan como sustantivos, adverbios o adjetivos, respectivamente; aunque, dado su carácter verbal pueden también funcionar como verbos y, por tanto, como núcleos del predicado.
El presente trabajo presenta una visión general sobre las formas no personales del verbo en español. Se debe recordar que las formas no personales del verbo tiene funciones y valores dentro de la oración.
Este trabajo lo dividimos en dos partes: la primera presenta un breve marco teórico en que se explica las formas no personales del verbo y como se forman además de sus funciones.
Abstract
... Show More