Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Aug 01 2024
Journal Name
Water Practice & Technology
Artificial neural network and response surface methodology for modeling oil content in produced water from an Iraqi oil field
...Show More Authors
ABSTRACT<p>The majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value &lt;0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, tempe</p> ... Show More
View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jul 02 2009
Journal Name
Journal Of Educational And Psychological Researches
تأثير الإشارات في استرجاع معلومات نص أدبي لدى طلبة كلية الهندسة
...Show More Authors

أهمية البحث والحاجة إليه :

      يعد نسيان المثيرات المعلوماتية التي يتعلمها أو يطلع عليها الفرد في حياته من المشكلات التي يعاني منها الأفراد في جميع مناحي الحياة وليس في مجال الدراسة الأكاديمية فحسب. وبالتالي فان هناك حاجة ملحة ومهمة لابتداع طرائق ووسائل وإمكانيات يمكن عن طريقها التقليل من نسيان المثيرات المعلوماتية المختلفة التي يتعلمها الفرد في حياته اليومية.

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Distinguishing Cartoons Images from Real –Life Images
...Show More Authors

Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-khwarizmi Engineering Journal
Recovery of Aluminum from Industrial Waste (Slag) by Melting and Electrorefining Processes
...Show More Authors

Slag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid waste according to the European Catalogue for Hazardous Wastes. Hence, recovery of aluminum not only saves the environment, but also has advantages of financial and economic returns. In this research, aluminum was recovered and purified from the industrial wastes generated as waste from both of State Company for Electrical and Electronic Industries (Baghdad/AlWaziriya) and General Company for Mechanical Industries (Babylon/-Al-Escandria). It was found that these wastes contain tiny proportions of other elements such as iron, copper, nickel, titanium, lead, and potassium. Wastes were

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Design &amp; Nature And Ecodynamics
Artificial Neural Network Assessment of Groundwater Quality for Agricultural Use in Babylon City: An Evaluation of Salinity and Ionic Composition
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref