Preferred Language
Articles
/
gxbpvYoBVTCNdQwCoKQX
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.

Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Place Sexuality in the Arabic Text Theatre
...Show More Authors

     It is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.

    The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Fri Sep 04 2015
Journal Name
International Journal Of Academic Research In Progressive Education And Development
The Influence of Three Teaching Methods on Undergraduate Physics Students' Group Work Skill
...Show More Authors

The purpose of this study is to compare the influence of three teaching methods, as represented by problem-based learning (PBL), the PBL with lecture method, and the conventional teaching on undergraduate physics students' group work skills among bachelor’s degree physics students. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The actual sample size comprises of 122 students, who were selected randomly from the physics department, college of education in iraq. Overall, the statistical results rejected null hypothesis of this study. Thus, using the PBL without or with lecture method enhances the skills of the group work among the bachelor’s degree physics studen

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Central European Agriculture
Biofertilizer (EM-1) effect on growth and yield of three bread wheat cultivars
...Show More Authors

Farmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A Novel Gravity ‎Optimization Algorithm for Extractive Arabic Text Summarization
...Show More Authors

 

An automatic text summarization system mimics how humans summarize by picking the most ‎significant sentences in a source text. However, the complexities of the Arabic language have become ‎challenging to obtain information quickly and effectively. The main disadvantage of the ‎traditional approaches is that they are strictly constrained (especially for the Arabic language) by the ‎accuracy of sentence feature ‎functions, weighting schemes, ‎and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Phonological features   For spoken text in the language
...Show More Authors

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of

... Show More
View Publication Preview PDF