Preferred Language
Articles
/
ijs-6232
3D Content Encryption Using Multi-Level Chaotic Maps

      Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content according to Hausdorff Distance (HD) approximately around 100 after the encryption process. It provides a high security against brute force attack because it has large key space equal to 10165 and secret key sensitivity using NPCR near 99:6% and UACI near 33:4%. The histogram and HD indicate the decrypted 3D content is identical to the origin where HD values approximate zero.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Computer Science
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Subsurface 3D Prediction Porosity Model from Converted Seismic and Well Data Using Model Based Inversion Technique

Seismic inversion technique is applied to 3D seismic data to predict porosity property for carbonate Yamama Formation (Early Cretaceous) in an area located in southern Iraq. A workflow is designed to guide the manual procedure of inversion process. The inversion use a Model Based Inversion technique to convert 3D seismic data into 3D acoustic impedance depending on low frequency model and well data is the first step in the inversion with statistical control for each inversion stage. Then, training the 3D acoustic impedance volume, seismic data and porosity wells data with multi attribute transforms to find the best statistical attribute that is suitable to invert the point direct measurement of porosity from well to 3D porosity distribut

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Surface Shape Descriptors on 3D Faces

The general objective of surface shape descriptors techniques is to categorize several surface shapes from collection data. Gaussian (K) and Mean (H) curvatures are the most broadly utilized indicators for surface shape characterization in collection image analysis. This paper explains the details of some descriptions (K and H), The discriminating power of 3D descriptors taken away from 3D surfaces (faces) is analyzed and present the experiment results of applying these descriptions on 3D face (with polygon mesh and point cloud representations). The results shows that Gaussian and Mean curvatures are important to discover unique points on the 3d surface (face) and the experiment result shows that these curvatures are very useful for some

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
on periodic point and chaotic functions

We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace

Crossref
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Seismic Structural –Stratigraphic Study of Dhufria Area (Mid -Iraq) Using (3D) Techniques

This study deals with the seismic reflection interpretation of lower Cretaceous Formations in Dhufria area, including structural and stratigraphic techniques. In the interpretation process, the 3-D seismic data volume and well logs have been used. Based on well logs and synthetic traces two horizons were identified and picked which are the top and bottom of Zubair Formation. These horizons were followed over all the area in order to obtain structural setting as well as studying Kirkuk group Formation of Tertiary age which represents highstand progradational seismic facies.

View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Scopus (2)
Scopus Crossref
View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Detection of Shallow Cavities Using 3D Resistivity Technique in a Small Site Near Haditha City, Western Iraq

     Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF