Preferred Language
Articles
/
ijs-8276
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency and secrecy for this algorithm, which are the main criteria for these modifications. In this paper, the main modification made for the Blowfish algorithm is altering the S-box according to the principles of the block cipher (OFB). The results were approved using hamming distance and avalanche effect. The proposed algorithm presents advantages on several points, including reducing the required time for the encryption and decryption processes and preventing transmission errors from perpetuating all data. Also, we can conclude that the modified Blowfish algorithm can be used for all text encryption systems because of its flexibility (unlimited input text size and expanding key size).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain
...Show More Authors

Nowadays, the advances in information and communication technologies open the wide door to realize the digital world’s dream. Besides, within the clear scientific scope in all fields, especially the medical field, it has become necessary to harness all the scientific capabilities to serve people, especially in medical-related services. The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes. The exchange of these images can be subject to several challenges, such as transmission bandwidth, time delivery, fraud, tampering, modifying, privacy, and more. This paper will introduce an algorithm consisting a combination of compression and encryption techniques to meet such chall

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
A Heuristic Approach to the Consecutive Ones Submatrix Problem
...Show More Authors

Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Structure and optical properties of PANI/MWCNTs nanocomposites thin films prepared by plasma jet polymerization
...Show More Authors

Polyaniline Multi walled Carbon nanotubes (PANI/MWCNTs) nanocomposite thin films have been prepared by non-equilibrium atmospheric pressure plasma jet on glass substrate with different weight percentage of MWCNTs 1, 2, 3, 4%. The diameter of the MWCNTs was in the range of 8-55 nm and length - - 55 55 μm. the nanocomposite thin films were characterized by UV-VIS, XRD, FTIR, and SEM. The optical studies show that the energy band gap of PANI/MWCNTs nanocomposites thin films will be different according to the MWCNTs polyaniline concentration. The XRD pattern indicates that the synthesized PANI/MWCNTs nanocomposite is amorphous. FTIR reveals the presence of MWCNTs nanoparticle embedded into polyaniline. SEM surface images show that the MWCNT

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Molecular Detection of Enterotoxin Genes of Multiresistant Staphylococcus aureus Isolates from Different Sources of Food
...Show More Authors

Foodborne diseases are a major risk for human health. Millions of people become sick as a result of eating contaminated food with microorganisms that cause diseases. S.  aureus is considered as one of the most important pathogenic bacteria, having the ability to  activate certain genes that encode for heat stable enterotoxins and cause Staphylococcal food poisoning. Thus, this study aimed to determine the prevalence of multi resistant Staphylococcus aureus that produce enterotoxins in different sources of food . Forty nine isolates were identified as S.aureus, according to morphological and biochemical tests. They were isolated from 387 different food samples from several randomly covered restaurants

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF