Preferred Language
Articles
/
ijs-6008
Text Compression & Encryption Method Based on RNA and MTF

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Color Image Compression System by using Block Categorization Based on Spatial Details and DCT Followed by Improved Entropy Encoder

In this paper, a new high-performance lossy compression technique based on DCT is proposed. The image is partitioned into blocks of a size of NxN (where N is multiple of 2), each block is categorized whether it is high frequency (uncorrelated block) or low frequency (correlated block) according to its spatial details, this done by calculating the energy of block by taking the absolute sum of differential pulse code modulation (DPCM) differences between pixels to determine the level of correlation by using a specified threshold value. The image blocks will be scanned and converted into 1D vectors using horizontal scan order. Then, 1D-DCT is applied for each vector to produce transform coefficients. The transformed coefficients will be qua

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
Scopus (1)
Crossref (17)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Scopus (36)
Crossref (38)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Nov 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing