Preferred Language
Articles
/
ijs-3538
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency of the AES algorithm by increasing the algorithm's security to make the algorithm more suitable for color image encryption, and make it more resistant to many attacks. The modification is conducted on ShiftRows transformation of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the Signal and Image Processing Institute's (SIPI) image dataset. Moreover, the Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Entropy (H), Correlation Coefficient (CC), visual evaluation of histogram, Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are used as an evaluation metric. The results show that proposed modification to the AES algorithm makes the algorithm more appropriate to image and surpasses the original AES. 

The modification is conducted on ShiftRows step of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the signal and image processing institute's (SIPI) image dataset. Moreover, the mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy (H), correlation coefficient (CC), visual evaluation of histogram, number of pixels change rate (NPCR) and unified average changing intensity (UACI) are used as an evaluation metrics. The results show that the suggested modification to AES makes it's more appropriate to the image and surpasses the original AES.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Color Image Compression of Inter-Prediction Base
...Show More Authors

Publication Date
Fri Jun 18 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Quadtree partitioning scheme of color image based
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Modified ZnO for efficient photo-catalysis by Silver/Graphite oxide nanoparticles
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sat Feb 01 2020
Journal Name
Civil Engineering Journal
Assessment of Moisture Susceptibility for Asphalt Mixtures Modified by Carbon Fibers
...Show More Authors

Moisture induced damage in asphaltic pavement might be considered as a serious defect that contributed to growth other distresses such as permanent deformation and fatigue cracking. This paper work aimed through an experimental effort to assess the behaviour of asphaltic mixtures that fabricated by incorporating several dosages of carbon fiber in regard to the resistance potential of harmful effect of moisture in pavement. Laboratory tests were performed on specimens containing fiber with different lengths and contents. These tests are: Marshall Test, the indirect tensile test and the index of retained strength. The optimum asphalt contents were determined based on the Marshall method. The preparation of asphaltic mixtures involved

... Show More
Scopus (23)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytic Solutions For Integro-Differential Inequalities Using Modified Adomian Decomposition Method
...Show More Authors

   This paper applies the Modified Adomian Decomposition Method (MADM) for solving Integro-Differential Inequality, this method  is one of effective to construct analytic approximate solutions for linear and nonlinear integro-differential inequalities without solving many integrals and transformed or discretization. Several examples are presented, the analytic results show that this method is a promising and powerful for solving these problems.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Male protagonists in Alice Walker's The Color Purple; a Voyage from Oppression to Maturity and Reconciliation
...Show More Authors

Alice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Treatment of Wastewater Contaminated with Pesticide (Alachlor) by Solar Enhanced Advanced Oxidation Processes
...Show More Authors

The degradation performance of aqueous solution of pesticide Alachlor has been studied at solar pilot scale plant in two photocatalytic systems: homogeneous photocatalysis by photo-Fenton and heterogeneous photocatalysis with titanium dioxide. The pilot scale system included of compound parabolic collectors specially designed for solar photocatalytic applications, and installed at University of Baghdad, Department of Environmental Engineering back yard. The influence of different concentrations, H2O2 (200-2400 mg/l), Fe+2(5- 30 mg/l) and TiO2 (100-500 mg/l) and their relationship with the degradation efficiency were studied.

      The COD removal efficienc

... Show More
View Publication Preview PDF
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain
...Show More Authors

Nowadays, the advances in information and communication technologies open the wide door to realize the digital world’s dream. Besides, within the clear scientific scope in all fields, especially the medical field, it has become necessary to harness all the scientific capabilities to serve people, especially in medical-related services. The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes. The exchange of these images can be subject to several challenges, such as transmission bandwidth, time delivery, fraud, tampering, modifying, privacy, and more. This paper will introduce an algorithm consisting a combination of compression and encryption techniques to meet such chall

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref