Preferred Language
Articles
/
ijs-4430
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. Results show that the pseudo-random keys created by using chaotic maps for cryptographic speech file have an acceptable characteristic concerning randomness tests, which is confirmed in this paper by using five statistical tests. The final evaluation of the speech encryption algorithm is measured by using different quality metrics, and the results show that the algorithm can achieve resist encryption.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
YouTube Keyword Search Engine Using Speech Recognition
...Show More Authors

Visual media is a better way to deliver the information than the old way of "reading". For that reason with the wide propagation of multimedia websites, there are large video library’s archives, which came to be a main resource for humans. This research puts its eyes on the existing development in applying classical phrase search methods to a linked vocal transcript and after that it retrieves the video, this an easier way to search any visual media. This system has been implemented using JSP and Java language for searching the speech in the videos

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 18 2023
Journal Name
International Journal Of Development In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF SELECTED POLITICAL SPEECH ON ONLINE EDUCATION
...Show More Authors

PDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023

View Publication
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
On Г-n- (Anti ) Generalized Strong Commutativity Preserving Maps for Semiprime Γ-Rings
...Show More Authors

      In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps  such that  is onto,  satisfy one of the following conditions  belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R   belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP)  Then there exists an element  and  additive maps  such that  is of the form  and   when condition (i) is satisfied, and     when condition (ii) is satisfied   

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Retreat and the science of speech Contemporary reading
...Show More Authors

However, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
 Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
 G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of Hate Speech
...Show More Authors

Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature)  targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using GABOR Filter And Different Self Organizing Maps Neural Networks
...Show More Authors

 

This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.

The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
A Comprehensive Study and Analysis of the Chaotic Chua Circuit
...Show More Authors

      was studied by taking several different values for the constant α and fixing the other three variables β, c and d with the values 25.58, -0.7142857, and -1.142, respectively. The purpose of this paper is to know the values by which the system transforms from a steady state to a chaotic state under the initial conditions x, y, and z that equal -1.6, 0 and 1.6 respectively. It was found that when the value of α is equal to 0, the Chua system is in a steady state, and when the value of α is equal to 9.5 and the wave is sinusoidal, the system is in oscillation, and when α is equal 13.4 the system is in a Quasi-chaotic state, and finally the system turns to the chaotic state when the value of α equals 15.0

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref