Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Abstract:
This study is studied one method of estimation and testing parameters mediating variables in a structural equations model SEM is causal steps method, in order to identify and know the variables that have indirect effects by estimating and testing mediation variables parameters by the above way and then applied to Iraq Women Integrated Social and Health Survey (I-WISH) for year 2011 from the Ministry of planning - Central statistical organization to identify if the variables having the effect of mediation in the model by the step causal methods by using AMOS program V.23, it was the independent variable X represents a phenomenon studied (cultural case of the
Data-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
Surveys has done for collecting Sunn Pest which been parasitized by oophagous parasitoids
in infested wheat fields of villages around Erbil, Sulimanya and Dohuk governorates from
April to the end of May 2010, the result showed that a high rat of eggs hatching was 96.3%
within Erbil governorate and its cleared from results that not all laid eggs had been hatched
normally . The percentage ratio of egg parasitism in general was low in most studied villages.
In this study: Trissolcus grandis Thompson, Trissolcus semistriotus Nees., and Telenomus sp.
on sunn pest eggs has been observed. Identification keys supported with figures were
formulated to identify of these species.
Science is linked to each other bonds assets, branches and even close to each other; to become a link of this type of patterns of scientific integration, and perhaps the most prominent science that saw the overlap and interdependence of science and jurisprudence and its origins, and this interdependence did not stop at the epistemological foundations of knowledge; To the branches, methods of extraction, and diligence to extend to the terminology; to find similar terms in both flags; to become those terms similar in the word and meaning and even the end, but we do not lack terms similar in pronunciation and differing in meaning; and this difference is imposed by the specificity of each science and what M E; however, approached many terms
... Show MoreMetasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreAbstract
The extremes effects in parameters readings which are BOD (Biological Oxygen Demands) and DO(Dissolved Oxygen) can caused error estimating of the model’s parameters which used to determine the ratio of de oxygenation and re oxygenation of the dissolved oxygen(DO),then that will caused launch big amounts of the sewage pollution water to the rivers and it’s turn is effect in negative form on the ecosystem life and the different types of the water wealth.
As result of what mention before this research came to employees Streeter-Phleps model parameters estimation which are (Kd,Kr) the de oxygenation and re oxygenation ratios on respect
... Show More