Preferred Language
Articles
/
ijs-3538
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency of the AES algorithm by increasing the algorithm's security to make the algorithm more suitable for color image encryption, and make it more resistant to many attacks. The modification is conducted on ShiftRows transformation of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the Signal and Image Processing Institute's (SIPI) image dataset. Moreover, the Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Entropy (H), Correlation Coefficient (CC), visual evaluation of histogram, Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are used as an evaluation metric. The results show that proposed modification to the AES algorithm makes the algorithm more appropriate to image and surpasses the original AES. 

The modification is conducted on ShiftRows step of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the signal and image processing institute's (SIPI) image dataset. Moreover, the mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy (H), correlation coefficient (CC), visual evaluation of histogram, number of pixels change rate (NPCR) and unified average changing intensity (UACI) are used as an evaluation metrics. The results show that the suggested modification to AES makes it's more appropriate to the image and surpasses the original AES.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Building and codifying a scale of the level of tactical performance of advanced volleyball players
...Show More Authors

The research objectives, to build a measure of the level of tactical performance of volleyball players applying for the Iraqi Premier League for the 2018-2019 season. The nature of the research problem, then the researchers determined the research sample in the deliberate manner of the players of the Iraqi clubs for the Premier League (B, A). The researchers adopted the entire community as a sample for the research, and the number (156) players distributed over (13) clubs and divided the sample into (12)players an exploratory experiment player representing (the police club) and (100) player representing the construction sample and after a maximum period of two months has passed since applying the scale to the construction sample the researc

... Show More
Preview PDF
Publication Date
Fri Mar 20 2009
Journal Name
Ijcsns International Journal Of Computer Science And Network Security
Pre-processing Importance for Extracting Contours from Noisy Echocardiographic Images
...Show More Authors

Contours extraction from two dimensional echocardiographic images has been a challenge in digital image processing. This is essentially due to the heavy noise, poor quality of these images and some artifacts like papillary muscles, intra-cavity structures as chordate, and valves that can interfere with the endocardial border tracking. In this paper, we will present a technique to extract the contours of heart boundaries from a sequence of echocardiographic images, where it started with pre-processing to reduce noise and produce better image quality. By pre-processing the images, the unclear edges are avoided, and we can get an accurate detection of both heart boundary and movement of heart valves.

Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
International Journal On Technical And Physical Problems Of Engineering
Deep Learning Techniques For Skull Stripping of Brain MR Images
...Show More Authors

Deep Learning Techniques For Skull Stripping of Brain MR Images

Scopus
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
Noise Reduction and Gestational Age Estimation for Ultrasound Fetuses Images.
...Show More Authors

Ultrasound imaging is often preferred over other medical imaging modalities because it is non-invasive, non-ionizing, and low-cost. However, the main weakness of medical ultrasound image is the poor quality of images, due to presence of speckle noise and blurring. Speckle is characteristic phenomenon in ultrasound images, which can be described as random multiplicative noise that occurrence is often undesirable, since it affects the tasks of human interpretation and diagnosis. Blurring is a form of bandwidth reduction of an ideal image owing to the imperfect image formation process. Image denoising involves processing of the image data to produce a visually high quality image. The denoising algorithms may be classified into two categorie

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Header-Words Based for Printed Arabic Document Images Retrieval System
...Show More Authors

Printed Arabic document image retrieval is a very important and needed system for many companies, governments and various users. In this paper, a printed Arabic document images retrieval system based on spotting the header words of official Arabic documents is proposed. The proposed system uses an efficient segmentation, preprocessing methods and an accurate proposed feature extraction method in order to prepare the document for classification process. Besides that, Support Vector Machine (SVM) is used for classification. The experiments show the system achieved best results of accuracy that is 96.8% by using polynomial kernel of SVM classifier.

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF