Preferred Language
Articles
/
bsj-6550
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Satellite Images Classification in Rural Areas Based on Fractal Dimension
...Show More Authors

Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Effect of low level nozzle height on properties of copper oxide absorption layer prepared by fully computerized spray pyrolysis depositions
...Show More Authors

The effect of approaching nozzle jet from the deposition surface
on structural, optical and morphology properties of copper oxide thin
films was studied. The film was prepared by homemade fully
computerized CNC spray pyrolysis deposition technique at
preparations speed (3, 4, 5, and 6 mm/sec). The repeated line mode
was used at deposition temperature equal 450 °C whereas the
spraying time was in the range of (15-30 min) according to the
deposition speed. The film exhibit polycrystalline structure with
preferred orientation along (-111), (022) and (011), (002) at a 2θ
value of (35.63o) and (38.8o) respectively. Optical band gaps were
recorded at these speed shows variance in value from (1.53-2.08 eV).
Fi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Synthesis and Evaluation of Platinum Nanoparticles Using F. Carica Fruit Extract and Their Antimicrobial Activities
...Show More Authors

Abstract

In this manuscript, a simple new method for the green synthesis of platinum nanoparticles (Pt NPs) utilizing F. carica Fig extract as reducing agent for antimicrobial activities was reported. Simultaneously, the microstructural and morphological features of the synthesized Pt NPs were thoroughly investigated. In particular, the attained Pt NPs exhibited spherical shape with diameter range of 5-30 nm and root mean square of 9.48 nm using Transmission Electron Microscopy (TEM) and Atomic Force Microscopy (AFM), respectively. Additionally, the final product (Pt NPs) was screened as antifungal and antibacterial agent against Candida and Aspergillus species as well as Gram-positive Staphyllococcus aureus and G

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Design and construction of anair pollution detection system using a laser beam and absorption spectroscopy
...Show More Authors

Air pollution is one of the important problems facing Iraq. Air pollution is the result of uncontrolled emissions from factories, car exhaust electric generators, and oil refineries and often reaches unacceptable limits by international standards. These pollutants can greatly affect human health and regular population activities. For this reason, there is an urgent need for effective devices to monitor the molecular concentration of air pollutants in cities and urban areas. In this research, an optical system has been built consisting of aHelium-Neonlaser,5mWand at 632.8 nm, a glass cell with a defined size, and a power meter(Gentec-E-model: uno) where a scattering of the laser beam occurs due to air pollution. Two pollutants were examin

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Neural Tube Defects in Iraq
...Show More Authors

1.
Embryonic Origin of Neural Tube Defects.
Insaf Jasim Mahmoud
2.
Etiology of Neural Tube Defectss.
Ali Abdul Razzak Obed
3.
Epidemiology of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi
4.
Surgical Management of Neural Tube Defects.
Laith Thamer Al-Ameri
5.
Prevention of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Water Treatment Using Zinc Nanoparticles and Apricot Plant Extracts from Organic and Inorganic Pollution
...Show More Authors

 

The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Modern Applied Science
A New Method for Detecting Cerebral Tissues Abnormality in Magnetic Resonance Images
...Show More Authors

We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St

... Show More