Preferred Language
Articles
/
ijs-3606
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of all image pixels based on a 1D logistic map to build IP table. Secondly, a new S-Box based on 2D-Henon chaos was created using more confusion to replace G-channel image data. Finally, design of a modern image encryption approach. This approach uses the key process confusion and diffusion operation and depend on IP and S-Box proposals in the encryption process and several shuffling operations using the 3D- Lornez chaos theory. Theoretical research and simulation suggest that starting sensitivity value of this method is high, has high protection, and encryption speed. Moreover, it also holds the value of the neighboring RGB close to zero. The studies show that the information security capabilities would be both safer and more efficient, as a result of our image quality assessment study. Number of Differential Pixel Rate Change Attacks (NPSR), Unified Average Altered Intensity (UACI), are quality and strength of encryption processing are proved by pixel correlation, Entropy to be good results.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques
...Show More Authors

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of Multi-Organization E-Government Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Extractive Multi-Document Summarization Model Based On Different Integrations of Double Similarity Measures
...Show More Authors

Currently, the prominence of automatic multi document summarization task belongs to the information rapid increasing on the Internet. Automatic document summarization technology is progressing and may offer a solution to the problem of information overload. 

Automatic text summarization system has the challenge of producing a high quality summary. In this study, the design of generic text summarization model based on sentence extraction has been redirected into a more semantic measure reflecting individually the two significant objectives: content coverage and diversity when generating summaries from multiple documents as an explicit optimization model. The proposed two models have been then coupled and def

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Image Focus Enhancement Using Focusing Filter and DT-CWT Based Image Fusion
...Show More Authors

Combining multi-model images of the same scene that have different focus distances can produce clearer and sharper images with a larger depth of field. Most available image fusion algorithms are superior in results. However, they did not take into account the focus of the image. In this paper a fusion method is proposed to increase the focus of the fused image and to achieve highest quality image using the suggested focusing filter and Dual Tree-Complex Wavelet Transform. The focusing filter consist of a combination of two filters, which are Wiener filter and a sharpening filter. This filter is used before the fusion operation using Dual Tree-Complex Wavelet Transform. The common fusion rules, which are the average-fusion rule and maximu

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
A Comprehensive Study and Analysis of the Chaotic Chua Circuit
...Show More Authors

      was studied by taking several different values for the constant α and fixing the other three variables β, c and d with the values 25.58, -0.7142857, and -1.142, respectively. The purpose of this paper is to know the values by which the system transforms from a steady state to a chaotic state under the initial conditions x, y, and z that equal -1.6, 0 and 1.6 respectively. It was found that when the value of α is equal to 0, the Chua system is in a steady state, and when the value of α is equal to 9.5 and the wave is sinusoidal, the system is in oscillation, and when α is equal 13.4 the system is in a Quasi-chaotic state, and finally the system turns to the chaotic state when the value of α equals 15.0

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref