Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 10 2023
Journal Name
Journal Of Namibian Studies : History Politics Culture
The food gap of the most important agricultural products in Iraq for the period 2003-2020 and ways to face it
...Show More Authors

Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by a combination of anodic oxidation with photocatalyst process: Recent advances, affecting factors and future perspectives
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Heliyon
The influence of pulse duration and exposure time of Er,Cr:YSGG laser on lithium disilicate laminate debonding, an in vitro study
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Alexandria Engineering Journal
Batch and continuous study of one-step sustainable green graphene sand hybrid synthesized from Date-syrup for remediation of contaminated groundwater
...Show More Authors

Scopus (26)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Red Ginger's Anti-Anxiety Effect on BALB/c Strain Mice (Mus musculus) Pro-Inflammatory and Anti-Inflammatory Measurements as Anxiety Model
...Show More Authors

There is a correlation between the occurrence of anxiety and the production of inflammatory mediators, and red ginger rhizome is a well-known herbal product with a high content of phenolic and flavonoid compounds that can be used as anti-inflammatories and antioxidants. The aim of study to evaluate the effect of red ginger as antianxiety in mice (Mus musculus) BALB/c strain by measuring levels of TNF-α, IL-6 and IL-10.  Anxiety model mice were carried out by giving treatment with the Forced Swimming Test (FST) for 7 days then assessed by carrying out the Elevated Plus Maze for Mice (EPM) test for one day. After the treatment, the anxiety mice model was made, followed by administration of red ginger ethanol extract therapy for 14 days.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 18 2023
Journal Name
Pharmacia
Synthesis, characterization, and antimicrobial evaluation of new Schiff bases derived from vanillic acid conjugated to heterocyclic 4H-1,2,4-triazole-3-thiol
...Show More Authors

A multistep synthesis was established for the preparation of a new vanillic acid-1, 2, 4-1triazole-3-thiol conjugate (4). Finally, several aromatized aldehydes reacted with compound (4) to produce Schiff bases derivatives (5–11). The purpose of this research is to prepare new vanillic acid derivatives with 1, 2, 4-triazole-3-thiol heterocyclic ring structures and to evaluate their antimicrobial activity in a preliminary assessment. Fourier-transform infrared (FT-IR) and proton nuclear magnetic resonance spectroscopy (1H-NMR) were used to verify the structures of the newly synthesized compounds. all the final synthesized compounds (

... Show More
View Publication
Scopus (14)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Ceramics International
Surface structural features and optical analysis of nanostructured Cu-oxide thin film coatings coated via the sol-gel dip coating method
...Show More Authors

View Publication
Scopus (38)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Geometrical Foundations of Shape in Structural Design of Contemporary Ceramic Pots "The artist "IBRAHIM SAEED" is a model"
...Show More Authors

Each era has advantages in terms of innovation and development in form, technology, style, and design in ceramic vessels, both at the level of functional and aesthetic performance, so this study aimed to demonstrate the importance of geometrical foundations in the design structure of contemporary ceramic vessels, and also to reveal the constructive skills in The structure of the ceramic figure.
The researchers used the descriptive analytical approach to suit the nature of the study, and they described and analyzed the ceramic works in terms of geometric shape systems, elements and foundations of design in construction, formal diversity in the general design of ceramic vessels, and references and sources of artwork. In addition to th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref