Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
The concept of transitional justice is newly emerging, as it was mainly associated with addressing issues of serious breaches and abuses of human rights during conflicts and situations resulting from violence and the use of force in societies that are in the process of democratization, as transitional justice aims primarily to restore civil peace and rebuild institutions The state needs multidimensional justice: a judicial system that achieves the rule of law, corrective restoration of the wounds of the past, and a distributive characteristic of the redistribution of wealth.
The research deals with the principle of the prohibition of international waterway diversion in the law of international watercourses. The research reviews individual and collective doctrinal efforts that have touched upon the principle as an internationally wrongful act because of its serious damage and consequences for downstream States. The research addresses the nature of the principle of the prohibition of diversion of international watercourses; its various effects; principles of international law establishing the principle of prohibition of diversion; and its application in State practice and international justice. This principle has been enshrined in most international treaties and judicial decisions. The principle of prohibition
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreThe great progress in information and communication technology has led to a huge increase in data available. Traditional systems can't keep up with this growth and can't handle this huge amount of data. Recommendation systems are one of the most important areas of research right now because they help people make decisions and find what they want among all this data. This study looked at the research trends published in Google Scholar within the period 2018-2022 related to recommending, reviewing, analysing, and comparing ebooks research papers. At first, the research papers were collected and classified based on the recommendation model used, the year of publication, and then they were compared in terms of techniques, datasets u
... Show MoreThe dangers of (Israel's) integration with Arab countries in the middle east region will threaten the Arab security structure dimension, which the latter makes the Arab regional system vulnerable for distortion due to its nominal and symbolic value which is far from the Arab self and questioning with its effectiveness in comparing with the real capabilities to Arab countries in achieving the common targets. So, how to assess the different problems that began to hit the structure of the Arab regional system? and how to pledge an allegiance after putting forward what is known as the American Deal of the Century for the administration of former US President Donald Trump for making another step toward normalization with (Israel)?. The reveal
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThis investigation is a study of the length of time where drops can exist at an oil-water interface before coalescence take place with a bulk of the same phase as the drops. Many factors affecting the time of coalescence were studied in is investigation which included: dispersed phase flow rate, continuous phase height, hole size in distributor, density difference between phases, and viscosity ratio of oil/water systems, employing three liquid/liquid systems; kerosene/water, gasoil/water, and hexane/water. Higher value of coalescence time was 8.26 s at 0.7ml/ s flow rate, 30cm height and 7mm diameter of hole for gas oil/water system, and lower value was 0.5s at 0.3ml/s flow rate, 10 cm height and 3mm diameter of hole for hexane
... Show More