Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Detailed feasibility study of the pre-cast reinforced concrete project and its importance in the construction of Iraq
...Show More Authors

 

Purpose:  Providing practical knowledge of the requirements of a detailed feasibility study for selecting the investment project.

Findings:  Directing the private sector towards investing in productive projects - the pre-cast reinforced concrete project - as it achieves a financial return as well as providing Providing foreign currencies by reducing imports and exploiting available natural resources

Practical implications: The importance of a detailed feasibility study to determining whether the project can be implemented or not.

The precast concrete method is one of the best modern c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation the Effect of Phytosterol Fraction of Chenopodium Murale in Comparison with Tacrolimus on Mice Induced Atopic Dermatitis
...Show More Authors

Atopic dermatitis (atopic eczema), is a common familial chronic inflammatory skin disease, determined by xerosis, itching, scaly and erythematous skin lesions, and high serum levels of IgE. Between 10 to 20% of children and 1 to 3% of adults worldwide affected by it and has negative medical and social effect on patients and their families. To evaluate the effectiveness of Phytosterol Fraction of Chenopodium Murale on induced atopic dermatitis (AD) of mice; Forty mice were included in the study, divided in to four groups (10 mice/group): apparently healthy, induced AD without treatment, induced AD treated with Tacrolimus 0.1% ointment, and induced AD treated with Phytosterol Fraction of Chenopodium Murale cream 3% topica

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (18)
Scopus Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Aesthetic employment of alliteration between the realistic and the fantasy in animated films
...Show More Authors

When a person found himself in a life he did not understand، he tried to create in his imagination powers and gods that tried to protect him from his ignorance of that world، and when he was reassured internally through those fantasy creatures when he made them the greatest protector and the source of his existence and his being، he began to weave myths and myths until he created his reality that he did not have. Any hint، and when we go back to the mechanism of embodying those myths، myths and fantasias in which he lived، we will find that the first building blocks were written on the walls of the caves in which he lived during that period. And when his thought developed and thus his expressive means developed، he began to embody

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Overlap of Visions between the Scenographer and the Director in the Theatrical Show
...Show More Authors

After the spread of the function of the scenographer in the modern theater, his vision has become present in most of the theatrical works and because the director is the master of the work and the owner of the vision that appears in front of the audience, the overlap between the visions of each of them was required. This research is an attempt to detect the overlap and disengagement in the work of each of them.
The research is divided into a methodological framework that included the research problem, importance, limits, and purpose, and then the definition of terms. In the theoretical framework, the research dealt with two theoretical sections that pave the way for raising ideas related to this subject: the first section (scenography

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The presidential system in Turkey between reality and challenges: a vision of the future
...Show More Authors

The nature of the political system of any country in the international system must have an impact on the policy of the State, whether in the interior or exterior, both regional and international, Turkey is one of the most important countries in the Middle East, which have a place and effectiveness on the surrounding environment, hence the importance of research lies in its political system and the transfer of power in it and its transformation from the form of the parliamentary system to the presidential system of the repercussions of the task and mutual effects between Turkey and the countries of the surrounding region in terms of the extent of achieving political stability in the Turkish interior or not and how this can be refl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 14 2020
Journal Name
Journal Of Planner And Development
The Impact of the Method of Dealing with the Product of Wars in the Continuity of the Crisis Wars. Beirut city as an Example
...Show More Authors

This research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.

The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (41)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.