Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Praise be to Allah, Lord of the Worlds and prayers to our master and our beloved Muhammad and to his God and companions.
The Sunnah of the prophet completed the prayer and delivery agreed to accept them as evidence of legislation, and the fundamentalists differed in accepting the news of Sundays in the pieces, and most likely if the hadeeth is proven, and completed the correct conditions there is no objection to accept it in branches and pieces. As for the work of the people of the city is one of the evidence adopted when the imam Malik, who is the Imam of the House of the Prophet's blessed immigration, and scientists differ greatly. If you offer a ruling and the ruling of the Hadith of the individual, and the rule of the work of the
Many researchers consider Homogeneous Charge Compression Ignition (HCCI) engine mode as a promising alternative to combustion in Spark Ignition and Compression Ignition Engines. The HCCI engine runs on lean mixtures of fuel and air, and the combustion is produced from the fuel autoignition instead of ignited by a spark. This combustion mode was investigated in this paper. A variable compression ratio, spark ignition engine type TD110 was used in the experiments. The tested fuel was Iraqi conventional gasoline (ON=82).
The results showed that HCCI engine can run in very lean equivalence ratios. The brake specific fuel consumption was reduced about 28% compared with a spark ignition engine. The experimental tests showed that the em
... Show MoreBackground. The presence of black triangles around the dental implant-supported prosthesis and the failure to construct adequate papillae around them bothers dental implantologists. Peri-implant surgical soft tissue management will improve esthetics, function, and implant survival. Aim. To compare the effects of rolled and nonrolled U-shaped flaps combined with a temporary crown in enhancing the soft tissue around dental implants. Materials and Methods. Forty patients were included in this study; all patients were operated on by the same maxillofacial surgeon at Al-Iraq specialized dental clinics from January 2019 to January 2020. Patients were divided randomly into two groups: group A: at the second stage of implant surgery, a U-sh
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The present study investigates the relation between the biliteral and triliteral roots which is the introduction to comprehend the nature of the Semitic roots during its early stage of development being unconfirmed to a single pattern. The present research is not meant to decide on the question of the biliteral roots in the Semitic languages, rather it is meant to confirm the predominance of the triliteral roots on these languages which refers, partially, to analogy adopted by the majority of linguists. This tendency is frequently seen in the languages which incline to over generalize the triliteral phenomenon, i. e., to transfer the biliteral roots to the triliteral room, that is, to subject it to the predominant pattern regarding the r
... Show MoreIn this paper has been one study of autoregressive generalized conditional heteroscedasticity models existence of the seasonal component, for the purpose applied to the daily financial data at high frequency is characterized by Heteroscedasticity seasonal conditional, it has been depending on Multiplicative seasonal Generalized Autoregressive Conditional Heteroscedastic Models Which is symbolized by the Acronym (SGARCH) , which has proven effective expression of seasonal phenomenon as opposed to the usual GARCH models. The summarizing of the research work studying the daily data for the price of the dinar exchange rate against the dollar, has been used autocorrelation function to detect seasonal first, then was diagnosed wi
... Show MoreThis Study aimed To know The relation between Types of blood and health problems which human Suffered from , and the effect of food intake on health.
Samples of study contained 269 person aged between 30 – 70 years which choiced randomly for sex , we are take all in formation about samples of study by form paper contian sex , age, type of blood , weight (kg) , height (cm) , smoking or.not , sporting or not, problems in digestive tract , sensitivity for foods , heart problems , ratio of cholesterol in blood , Sinusitis , Asthma , diabetic meliuts , arritable bowel syndrome , diaherra , problems in kidney and urination , hypertension , anemia , alternation in liver function , arthritis with form record in daily food intake and its ade
This paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the slid
... Show More