Preferred Language
Articles
/
ijs-6232
3D Content Encryption Using Multi-Level Chaotic Maps

      Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content according to Hausdorff Distance (HD) approximately around 100 after the encryption process. It provides a high security against brute force attack because it has large key space equal to 10165 and secret key sensitivity using NPCR near 99:6% and UACI near 33:4%. The histogram and HD indicate the decrypted 3D content is identical to the origin where HD values approximate zero.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 28 2021
Journal Name
2021 1st Babylon International Conference On Information Technology And Science (bicits)
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
3D Model Watermarking based on Wavelet Transform

      In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 12 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Scopus Crossref
View Publication
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Application of Mathematical 3D Surface Using Bi-cubic B-Spline Models

This paper describes a modified mathematical method that used for controlling and generating three dimensional surfaces based on different axes (X, Y, and Z) and free axis. The main aim of the proposed method is to allow the designer to change the shape of the surface to the desired one without changing the original data points which is presented in the earlier version of this paper under title "3D Surface Reconstruction of Mathematical Modelling Used for Controlling the Generation of Different Bi-cubic B-Spline in Matrix Form without Changing the Control Points". The proposed method has been done by changing the t and s, parameters value that are assigned secretly by the designer. Therefore, in case off the control points have been disc

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Iraqi Journal Of Laser
Reconstruction of 3D Shape for an Object using Laser Scanning Triangulation

This paper presents a method of designing and constructing a system capable of acquiring
the third dimension and reconstructs a 3D shape for an object from multi images of that object using
the principle of active optical triangulation. The system consists of an illumination source, a photo
detector, a movement mechanism and a PC, which is working as a controlling unit for the hard ware
components and as an image processing unit for the object multi view raw images which must be
processed to extract the third dimension. The result showed that the optical triangulation method
provides a rapid mean for obtaining accurate and quantitative distance measurements. The final
result's analysis refers to the necessity of usin

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Agile manufacturing assessment model using multi-grade evaluation

In unpredicted industrial environment, being able to adapt quickly and effectively to the changing is key in gaining a competitive advantage in the global market. Agile manufacturing evolves new ways of running factories to react quickly and effectively to changing markets, driven by customized requirement. Agility in manufacturing can be successfully achieved via integration of information system, people, technologies, and business processes. This article presents the conceptual model of agility in three dimensions named: driving factor, enabling technologies and evaluation of agility in manufacturing system. The conceptual model was developed based on a review of the literature. Then, the paper demonstrates the agility

... Show More
Crossref (2)
Crossref
View Publication Preview PDF