Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Self-Localization of Guide Robots Through Image Classification
...Show More Authors

The field of autonomous robotic systems has advanced tremendously in the last few years, allowing them to perform complicated tasks in various contexts. One of the most important and useful applications of guide robots is the support of the blind. The successful implementation of this study requires a more accurate and powerful self-localization system for guide robots in indoor environments. This paper proposes a self-localization system for guide robots.  To successfully implement this study, images were collected from the perspective of a robot inside a room, and a deep learning system such as a convolutional neural network (CNN) was used. An image-based self-localization guide robot image-classification system delivers a more accura

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetic images in Mohammed Thanoun graphic
...Show More Authors

The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
ESTIMATION OF MUNICIPAL SOLID WASTE GENERATION AND LANDFILL VOLUME GENERATION AND LANDFILL VOLUME USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Use Of Artificial Neural Networks In Developing The Role Of Auditor In Discovering Fundamental Errors: An Applied Research In General Company for Electrical Industries and Nasr General Company for Mechanical Industries
...Show More Authors

Artificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
البرمجة اللغوية العصبية(NLP)
...Show More Authors

* مشكلة البحث والحاجة اليه:

تأتي أهمية هذا العلم وقوته ومدى الحاجة اليه لكل الناس وخاصة اللذين يريدون أن يغيروا عاداتهم السيئة ويأثروا في غيرهم ، أذ اكد المفكرون والقادة والمصلحون ورجال التربية أنه يجب على الإنسان ان يكون مثابراً ومجتهداً ومتقناً لعمله ، ومنظماً لوقته الى اخر القائمة الطويلة من مفردات الجودة ولم يقولوا كيف يمكن للانسان ان يفعل ذلك ؟ أن علم الهندسة النفسية استطاع ان يجيب.&nbsp

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus