Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi Postgraduate Medical Journal
Angiolymphoid hyperplasia with eosinophilia (pseudopyogenic granuloma) among Iraqi patients
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Intemperance Use of the Internet with the University's Students
...Show More Authors

The research aims:
1- To know the intemperance use of the internet by the University's students.
2- To know the differences with a statistical indication in the intemperance use of the internet after the gender's inconstant ( Males-females).
3- To know the differences with a statistical indication in the intemperance use of the internet after the Major's inconstant ( scientific- humanistic)
This current research restricts a sample of the university students for both sexes.
Theoretical frame:
The research viewed several theories that explains intemperance use of the internet & the results.
Research measures :
1- Research has been adapted the scale ( Internet use) which was prepared by the Moroccan researcher (

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
numbers of PFCanti-HBc in patients with chronic Hepatitis
...Show More Authors

plaque forming assay was used enumerate the number of plaque forming cells of anti-HBc in eight patintes with chronic hepatitis and eight health

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Active Ocular involvement in iraqi Patients with Behçet's Disease
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Auto-antibodies Profile in Children Infected with Visceral Leishmaniasis
...Show More Authors

Visceral leishmaniasis (VL) is a parasitic infection caused by an intracellular growth of Leishmania spp. in macrophage cells. The autoimmune disorder is a condition takes place when the immune system produces antibodies which incorrectly attacked its own body tissues. VL has been involved as an effect or on the autoimmune aspect. This study was conducted to identify the auto antibodies profile in patients infected with VL. The presences of auto antibodies in 21 Iraqi children infected with VL were tested for laboratory autoimmune aspect. The highest percentage of seropositive in Leishmania patients was observed for anti-ds DNA, anti-Mi-2, anti-Ku and anti-PCNA antibodies (90.5%, 90.5%, 90.5% and 61.9%) respectively, while the lowest percen

... Show More
Scopus
Publication Date
Sat Dec 01 2012
Journal Name
2012 Ieee-embs Conference On Biomedical Engineering And Sciences
Compatibility of mother wavelet functions with the electroencephalographic signal
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
Otolarygological Manifestations of Patients with Confirmed Covid-19 Infection
...Show More Authors

Background: the coronavirus leads to upper respiratory tract-associated manifestations like nasal congestion, sore throat, and smell disorder

Objectives: To reveal the impact of COVID-19 pandemic on otolaryngology symptoms using our daily medical practice.

Subject and Methods: A cross-sectional study that was carried on in the isolation wards at Al-Kindy and Al-Nu’man Teaching Hospitals during three months from the 1st of Jun. till the end of Aug. 2020. It included 1270 patients who were diagnosed with COVID-19 infection seen in the ENT consultation clinic and admitted to the isolation wards.

Results: Otolaryngological manifestations were shown

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 29 2013
Journal Name
Journal Of Statistics Applications & Probability
Analyzing Skewed Data with the Epsilon Skew Gamma distribution
...Show More Authors

A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution

Crossref (5)
Crossref