Preferred Language
Articles
/
ijs-3538
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency of the AES algorithm by increasing the algorithm's security to make the algorithm more suitable for color image encryption, and make it more resistant to many attacks. The modification is conducted on ShiftRows transformation of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the Signal and Image Processing Institute's (SIPI) image dataset. Moreover, the Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Entropy (H), Correlation Coefficient (CC), visual evaluation of histogram, Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are used as an evaluation metric. The results show that proposed modification to the AES algorithm makes the algorithm more appropriate to image and surpasses the original AES. 

The modification is conducted on ShiftRows step of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the signal and image processing institute's (SIPI) image dataset. Moreover, the mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy (H), correlation coefficient (CC), visual evaluation of histogram, number of pixels change rate (NPCR) and unified average changing intensity (UACI) are used as an evaluation metrics. The results show that the suggested modification to AES makes it's more appropriate to the image and surpasses the original AES.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE SOCIAL INTERACTION OF LANGUAGE IN A COMIC SERIES: A SOCIOLINGUISTIC STUDY
...Show More Authors

Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo

... Show More
View Publication
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Surgical Neurology International
Ruptured giant aneurysm of a cortical middle cerebral artery: A case report
...Show More Authors
Background:

Aneurysms of the cortical branches of the middle cerebral artery (MCA) are rare. They usually are secondary to traumatic or infectious etiologies and are rarely idiopathic. The specific characteristics of idiopathic aneurysms in such location are not well defined in the literature. The authors report a rare case of a ruptured giant idiopathic cortical MCA aneurysm with review of the available literature on this clinical entity.

Case Description:

A 24-year-old female presented with headache, disturbed level of consciousness, and right-sided weakness. Imaging studies showed a left frontoparietal intracer

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
IRAQ BETWEEN A CULTURE OF CIVIL SOCIETY AND A CULTURE OF VIOLENCE
...Show More Authors

The title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.

The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.

Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe cri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Study of a Certain Family of Multivalent Functions Associated with Subordination
...Show More Authors

The aim of this paper is to introduce a certain family of new classes of multivalent functions associated with subordination. The various results obtained here for each of these classes include coefficient estimates radius of convexity, distortion and growth theorem.  

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Al–bahith Al–a'alami
Image of relief organizations for displaced Iraqis
...Show More Authors

This research aims to know the intellectual picture the displaced people formed about aid organizations and determine whether they were positive or negative, the researchers used survey tool as standard to study the society represented by displaced people living in Baghdad camps from Shiites, Sunnis, Shabak, Turkmen, Christians, and Ezidis.
The researcher reached to important results and the most important thing he found is that displaced people living in camps included in this survey hold a positive opinion about organizations working to meet their demands but they complain about the shortfall in the health care side.
The research also found that displaced people from (Shabak, Turkmen, and Ezidi) minorities see that internati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Blind De-Blurring of Digital Image
...Show More Authors

      Nowadays, huge digital images are used and transferred via the Internet. It has been the primary source of information in several domains in recent years. Blur image is one of the most common difficult challenges in image processing, which is caused via object movement or a camera shake. De-blurring is the main process to restore the sharp original image, so many techniques have been proposed, and a large number of research papers have been published to remove blurring from the image. This paper presented a review for the recent papers related to de-blurring published in the recent years (2017-2020). This paper focused on discussing various strategies related to enhancing the software's for image de-blur.&n

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref